Try VMRay Platform
Malicious
Classifications

Spyware

Threat Names

Mal/Generic-S

Remarks (2/2)

(0x0200000E): The overall sleep time of all monitored processes was truncated from "2 minutes, 58 seconds" to "178.0 milliseconds" to reveal dormant functionality.

(0x0200000D): In the case of standalone driver analysis, the Verdict does not take into account kernel mode function calls.

Kernel Graph 1

Kernel Graph

Kernel Graph Legend
Code Block #1 (EP #2)
»
Information Value
Trigger IopLoadDriver+0x51c
Start Address 0xfffff800fc7e9369
Execution Path #2 (length: 137, count: 1, processes: 1)
»
Information Value
Sequence Length 137
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x160, ret_val_ptr_out = 0xffffe0003c634010
NtQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x0, SystemInformation_ptr_out = 0xffffd0002d296f70, ResultLength_ptr_out = 0xffffd0002d296f68, ResultLength_out = 0xffffd00000009f98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x13f30, ret_val_ptr_out = 0xffffe0003c8ca000
NtQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x13f30, SystemInformation_ptr_out = 0xffffe0003c8ca000, ResultLength_ptr_out = 0xffffd0002d296f68, ResultLength_out = 0xffffd00000009f98, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c8ca000, Tag = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2b0000, Length = 0x41dbfd, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ba4a000
MmProbeAndLockPages MemoryDescriptorList_unk = 0xffffe0003ba4a000, AccessMode_unk = 0x0, Operation_unk = 0x1, MemoryDescriptorList_unk_out = 0xffffe0003ba4a000
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ba4a000, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x4d004500000020, ret_val_ptr_out = 0xffffdff441600000
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x3e6c, ret_val_ptr_out = 0xffffe0003c8ca000
NtQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x0, SystemInformation_ptr_out = 0xffffd0002d296f70, ResultLength_ptr_out = 0xffffd0002d296f68, ResultLength_out = 0x9f98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x13f30, ret_val_ptr_out = 0xffffe0003af78000
NtQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x13f30, SystemInformation_ptr_out = 0xffffe0003af78000, ResultLength_ptr_out = 0xffffd0002d296f68, ResultLength_out = 0x9f98, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af78000, Tag = 0x0
NtQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x0, SystemInformation_ptr_out = 0xffffd0002d296f70, ResultLength_ptr_out = 0xffffd0002d296f68, ResultLength_out = 0xfffff80000009f98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x13f30, ret_val_ptr_out = 0xffffe0003af78000
NtQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x13f30, SystemInformation_ptr_out = 0xffffe0003af78000, ResultLength_ptr_out = 0xffffd0002d296f68, ResultLength_out = 0xfffff80000009f98, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af78000, Tag = 0x0
NtQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x0, SystemInformation_ptr_out = 0xffffd0002d296f70, ResultLength_ptr_out = 0xffffd0002d296f68, ResultLength_out = 0xfffff80000009f98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x13f30, ret_val_ptr_out = 0xffffe0003af78000
NtQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x13f30, SystemInformation_ptr_out = 0xffffe0003af78000, ResultLength_ptr_out = 0xffffd0002d296f68, ResultLength_out = 0xfffff80000009f98, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af78000, Tag = 0x0
KeSetSystemAffinityThread Affinity_unk = 0x1
KeRevertToUserAffinityThread -
MmUnlockPages MemoryDescriptorList_unk = 0xffffe0003ba4a000, MemoryDescriptorList_unk_out = 0xffffe0003ba4a000
IoFreeMdl Mdl_unk = 0xffffe0003ba4a000
RtlInitUnicodeString SourceString = mcd.sys, DestinationString_out = mcd.sys
RtlInitUnicodeString SourceString = mcd.sys, DestinationString_out = mcd.sys
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x98, ret_val_ptr_out = 0xffffc000b9db2560
RtlGetVersion lpVersionInformation_ptr_out = 0xffffd0002d297000, lpVersionInformation_deref_dwOSVersionInfoSize_out = 0x11c, lpVersionInformation_deref_dwMajorVersion_out = 0xa, lpVersionInformation_deref_dwMinorVersion_out = 0x0, lpVersionInformation_deref_dwBuildNumber_out = 0x295a, lpVersionInformation_deref_dwPlatformId_out = 0x2, lpVersionInformation_deref_szCSDVersion_out = , ret_val_out = 0x0
ZwOpenKey DesiredAccess_unk = 0x20019, ObjectAttributes_ptr = 0xffffd0002d296f80, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd0002d296fd8, KeyHandle_out = 0xffffffff80000a88, ret_val_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x1, NumberOfBytes_ptr = 0x1000, Tag = 0x454e4f42, ret_val_ptr_out = 0xffffc000ba41a000
ZwQueryValueKey KeyHandle_unk = 0xffffffff80000a88, ValueName = BuildLabEx, KeyValueInformationClass_unk = 0x1, Length = 0x1000, KeyValueInformation_ptr_out = 0xffffc000ba41a000, KeyValueInformation_deref_TitleIndex_out = 0x0, KeyValueInformation_deref_Type_out = 0x1, KeyValueInformation_deref_DataOffset_out = 0x28, KeyValueInformation_deref_DataLength_out = 0x52, KeyValueInformation_deref_NameLength_out = 0x14, KeyValueInformation_deref_Name_out = BuildLabEx, KeyValueInformation_deref_Data_out = 10586.0.amd64fre.th2_release.151029-1700, ResultLength_ptr_out = 0xffffd0002d296fd0, ret_val_out = 0x0
RtlUnicodeStringToInteger String = 0., Base = 0xa, Value_ptr_out = 0xffffd0002d297130, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000ba41a000, Tag = 0x454e4f42
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
MmGetSystemRoutineAddress SystemRoutineName = NtOpenFile, ret_val_ptr_out = 0xfffff80041a96348
ZwQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x0, SystemInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd0002d296f68, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9f98, Tag = 0x454e4f42, ret_val_ptr_out = 0xffffe0003af78000
ZwQuerySystemInformation SystemInformationClass_unk = 0xb, Length_ptr = 0x9f98, SystemInformation_ptr_out = 0xffffe0003af78000, ResultLength_ptr_out = 0xffffd0002d296f68, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af78000, Tag = 0x454e4f42
RtlImageNtHeader BaseAddress_ptr = 0xfffff80041684000, ret_val_unk_out = 0xfffff80041684108
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = .text, DestinationString_out = .text
RtlCompareString String1 = PAGE, String2 = .text, CaseInSensitive = 1, ret_val_out = 34
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = ERRATA, DestinationString_out = ERRATA
RtlCompareString String1 = PAGE, String2 = ERRATA, CaseInSensitive = 1, ret_val_out = 11
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = INITKDBGMþ, DestinationString_out = INITKDBGMþ
RtlCompareString String1 = PAGE, String2 = INITKDBGMþ, CaseInSensitive = 1, ret_val_out = 7
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = POOLCODE ', DestinationString_out = POOLCODE '
RtlCompareString String1 = PAGE, String2 = POOLCODE ', CaseInSensitive = 1, ret_val_out = -14
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = .rdata, DestinationString_out = .rdata
RtlCompareString String1 = PAGE, String2 = .rdata, CaseInSensitive = 1, ret_val_out = 34
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = .data, DestinationString_out = .data
RtlCompareString String1 = PAGE, String2 = .data, CaseInSensitive = 1, ret_val_out = 34
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = .pdata, DestinationString_out = .pdata
RtlCompareString String1 = PAGE, String2 = .pdata, CaseInSensitive = 1, ret_val_out = 34
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = ALMOSTROP1, DestinationString_out = ALMOSTROP1
RtlCompareString String1 = PAGE, String2 = ALMOSTROP1, CaseInSensitive = 1, ret_val_out = 15
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = CACHEALI, DestinationString_out = CACHEALI
RtlCompareString String1 = PAGE, String2 = CACHEALI, CaseInSensitive = 1, ret_val_out = 13
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = PAGELK, DestinationString_out = PAGELK
RtlCompareString String1 = PAGE, String2 = PAGELK, CaseInSensitive = 1, ret_val_out = -2
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlInitAnsiString SourceString = PAGE, DestinationString_out = PAGE
RtlCompareString String1 = PAGE, String2 = PAGE, CaseInSensitive = 1, ret_val_out = 0
RtlGetVersion lpVersionInformation_ptr_out = 0xfffff800fc55b1a0, lpVersionInformation_deref_dwOSVersionInfoSize_out = 0x0, lpVersionInformation_deref_dwMajorVersion_out = 0xa, lpVersionInformation_deref_dwMinorVersion_out = 0x0, lpVersionInformation_deref_dwBuildNumber_out = 0x295a, lpVersionInformation_deref_dwPlatformId_out = 0x2, lpVersionInformation_deref_szCSDVersion_out = , ret_val_out = 0x0
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd0002d2970f0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd0002d297140, KeyHandle_out = 0xffffffff80000a88, Disposition_ptr_out = 0xffffd0002d297138, Disposition_out = 0x2, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
RtlInitUnicodeString SourceString = DependOnService, DestinationString_out = DependOnService
RtlInitUnicodeString SourceString = Group, DestinationString_out = Group
RtlInitUnicodeString SourceString = Start, DestinationString_out = Start
ZwOpenKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd0002d2970f0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd0002d297140, KeyHandle_out = 0xffffffff80000a88, ret_val_out = 0x0
ZwSetValueKey KeyHandle_unk = 0xffffffff80000a88, ValueName = DependOnService, TitleIndex = 0x0, Type = 0x1, Data = FltMgr, DataSize = 0x10, ret_val_out = 0x0
ZwSetValueKey KeyHandle_unk = 0xffffffff80000a88, ValueName = Group, TitleIndex = 0x0, Type = 0x1, Data = System Reserved, DataSize = 0x22, ret_val_out = 0x0
ZwSetValueKey KeyHandle_unk = 0xffffffff80000a88, ValueName = Start, TitleIndex = 0x0, Type = 0x4, Data_ptr = 0xffffd0002d297130, Data = 0x0, DataSize = 0x4, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x800, ret_val_ptr_out = 0xffffe0003c634800
RtlInitUnicodeString SourceString = \, DestinationString_out = \
RtlInitUnicodeString SourceString = Instances, DestinationString_out = Instances
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd0002d296f10, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO\Instances, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd0002d297170, KeyHandle_out = 0xffffffff80000a88, Disposition_ptr_out = 0xffffd0002d297160, Disposition_out = 0x1, ret_val_out = 0x0
RtlInitUnicodeString SourceString = DefaultInstance, DestinationString_out = DefaultInstance
ZwSetValueKey KeyHandle_unk = 0xffffffff80000a88, ValueName = DefaultInstance, TitleIndex = 0x0, Type = 0x1, Data = 4UonVc8lOEt4AL4JQLxQ8QpV1vO Instance, DataSize = 0x4a, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
RtlInitUnicodeString SourceString = \, DestinationString_out = \
RtlInitUnicodeString SourceString = 4UonVc8lOEt4AL4JQLxQ8QpV1vO Instance, DestinationString_out = 4UonVc8lOEt4AL4JQLxQ8QpV1vO Instance
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd0002d296f10, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO\Instances\4UonVc8lOEt4AL4JQLxQ8QpV1vO Instance, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd0002d297170, KeyHandle_out = 0xffffffff80000a88, Disposition_ptr_out = 0xffffd0002d297160, Disposition_out = 0x1, ret_val_out = 0x0
RtlInitUnicodeString SourceString = Altitude, DestinationString_out = Altitude
RtlInitUnicodeString SourceString = 399996, DestinationString_out = 399996
ZwSetValueKey KeyHandle_unk = 0xffffffff80000a88, ValueName = Altitude, TitleIndex = 0x0, Type = 0x1, Data = 399996, DataSize = 0xe, ret_val_out = 0x0
RtlInitUnicodeString SourceString = Flags, DestinationString_out = Flags
ZwSetValueKey KeyHandle_unk = 0xffffffff80000a88, ValueName = Flags, TitleIndex = 0x0, Type = 0x4, Data_ptr = 0xffffd0002d297168, Data = 0x0, DataSize = 0x4, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634800, Tag = 0x0
PsCreateSystemThread DesiredAccess = 0x1fffff, ObjectAttributes_unk = 0xffffd0002d2971a0, ProcessHandle_unk = 0x0, StartRoutine_unk = 0xfffff800fc2cbcb0, StartContext_ptr = 0x0, ThreadHandle_ptr_out = 0xffffd0002d2971e0, ThreadHandle_out = 0xffffffff80000a88, ClientId_unk_out = 0x0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
RtlAppendUnicodeToString Source = \Device\Tcp1Flt, Destination_out = \Device\Tcp1Flt, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \Device\Tcp1Flt, Source = netfilter2, Destination_out = \Device\Tcp1Fltnetfilter2, ret_val_out = 0x0
RtlAppendUnicodeToString Source = \Device\Tcp61Flt, Destination_out = \Device\Tcp61Flt, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \Device\Tcp61Flt, Source = netfilter2, Destination_out = \Device\Tcp61Fltnetfilter2, ret_val_out = 0x0
RtlAppendUnicodeToString Source = \Device\Udp1Flt, Destination_out = \Device\Udp1Flt, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \Device\Udp1Flt, Source = netfilter2, Destination_out = \Device\Udp1Fltnetfilter2, ret_val_out = 0x0
RtlAppendUnicodeToString Source = \Device\Udp61Flt, Destination_out = \Device\Udp61Flt, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \Device\Udp61Flt, Source = netfilter2, Destination_out = \Device\Udp61Fltnetfilter2, ret_val_out = 0x0
RtlAppendUnicodeToString Source = \Device\Ctrl, Destination_out = \Device\Ctrl, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \Device\Ctrl, Source = SM, Destination_out = \Device\CtrlSM, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \Device\CtrlSM, Source = netfilter2, Destination_out = \Device\CtrlSMnetfilter2, ret_val_out = 0x0
RtlAppendUnicodeToString Source = \DosDevices\Ctrl, Destination_out = \DosDevices\Ctrl, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \DosDevices\Ctrl, Source = SM, Destination_out = \DosDevices\CtrlSM, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \DosDevices\CtrlSM, Source = netfilter2, Destination_out = \DosDevices\CtrlSMnetfilter2, ret_val_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x5e60, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af78000
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x5e60, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af7e000
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x5e60, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af84000
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x5e60, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af8a000
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x5e60, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af90000
KeInitializeDpc DeferredRoutine_unk = 0xfffff800fc2b6db0, DeferredContext_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c170
KeInitializeTimer Timer_unk_out = 0xfffff800fc55c130
KeInitializeDpc DeferredRoutine_unk = 0xfffff800fc2c46a0, DeferredContext_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8
KeInitializeDpc DeferredRoutine_unk = 0xfffff800fc2b21a0, DeferredContext_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c250
KeInitializeDpc DeferredRoutine_unk = 0xfffff800fc2b6e90, DeferredContext_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290
IoCreateDevice DriverObject_unk = 0xffffe0003cbe3e60, DeviceExtensionSize = 0x0, DeviceName = \Device\CtrlSMnetfilter2, DeviceType_unk = 0x22, DeviceCharacteristics = 0x100, Exclusive = 0, DeviceObject_unk_out = 0xfffff800fc55c080, ret_val_out = 0x0
IoCreateSymbolicLink SymbolicLinkName = \DosDevices\CtrlSMnetfilter2, DeviceName = \Device\CtrlSMnetfilter2, ret_val_out = 0x0
PsCreateSystemThread DesiredAccess = 0x1fffff, ObjectAttributes_unk = 0xffffd0002d297120, ProcessHandle_unk = 0x0, StartRoutine_unk = 0xfffff800fc2ba140, StartContext_ptr = 0xffffe0003cbe3e60, ThreadHandle_ptr_out = 0xffffd0002d297168, ThreadHandle_out = 0xffffffff80000a88, ClientId_unk_out = 0x0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
PsCreateSystemThread DesiredAccess = 0x1fffff, ObjectAttributes_unk = 0xffffd0002d297120, ProcessHandle_unk = 0x0, StartRoutine_unk = 0xfffff800fc2cb1c0, StartContext_ptr = 0x0, ThreadHandle_ptr_out = 0xffffd0002d297160, ThreadHandle_out = 0xffffffff80000a88, ClientId_unk_out = 0x0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
PsSetCreateProcessNotifyRoutine NotifyRoutine_unk = 0xfffff800fc2caa50, Remove = 0, ret_val_out = 0x0
PsSetCreateProcessNotifyRoutine NotifyRoutine_unk = 0xfffff800fc2caa40, Remove = 0, ret_val_out = 0x0
IoRegisterShutdownNotification DeviceObject_unk = 0xffffe0003bb063b0, ret_val_out = 0x0
Code Block #5 (EP #175)
»
Information Value
Trigger PspSystemThreadStartup+0x3f
Start Address 0xfffff800fc2cbcb0
Execution Path #175 (length: 9, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 9
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c21f350
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c21f350, MemoryDescriptorList_unk_out = 0xffffe0003c21f350
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c21f350, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00037d3d560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00037d3d560, MemoryDescriptorList_unk = 0xffffe0003c21f350
IoFreeMdl Mdl_unk = 0xffffe0003c21f350
CmRegisterCallback Function_unk = 0xfffff800fc2cb560, Context_ptr = 0x0, Cookie_ptr_out = 0xfffff800fc55b358, ret_val_out = 0x0
PsCreateSystemThread DesiredAccess = 0x1fffff, ObjectAttributes_unk = 0xffffd0002e35e480, ProcessHandle_unk = 0x0, StartRoutine_unk = 0xfffff800fc2cbbc0, StartContext_ptr = 0x0, ThreadHandle_ptr_out = 0xffffd0002e35e4d8, ThreadHandle_out = 0xffffffff80000c04, ClientId_unk_out = 0x0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000c04, ret_val_out = 0x0
PsTerminateSystemThread ExitStatus = 0x0
Code Block #6 (EP #176)
»
Information Value
Trigger PspSystemThreadStartup+0x3f
Start Address 0xfffff800fc2ba140
Execution Path #176 (length: 1156, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 1156
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
ZwQuerySystemInformation SystemInformationClass_unk = 0x5, Length_ptr = 0x0, SystemInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d29490, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1fb18, Tag = 0x454e4f42, ret_val_ptr_out = 0xffffe0003a764000
ZwQuerySystemInformation SystemInformationClass_unk = 0x5, Length_ptr = 0x1fb18, SystemInformation_ptr_out = 0xffffe0003a764000, ResultLength_ptr_out = 0xffffd00033d29490, ret_val_out = 0x0
PsLookupProcessByProcessId ProcessId_unk = 0x0, Process_unk_out = 0xffffd00033d29498, ret_val_out = 0xc000000b
PsLookupProcessByProcessId ProcessId_unk = 0x4, Process_unk_out = 0xffffd00033d29498, ret_val_out = 0x0
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_strnicmp _Str1 = System, _Str = smss.exe, _MaxCount_ptr = 0x8, ret_val_out = 12
PsLookupProcessByProcessId ProcessId_unk = 0x12c, Process_unk_out = 0xffffd00033d29498, ret_val_out = 0x0
PsGetProcessImageFileName ret_val_out = 0xffffe0003af4f490
_strnicmp _Str1 = smss.exe, _Str = smss.exe, _MaxCount_ptr = 0x8, ret_val_out = 0
ExFreePoolWithTag P_ptr = 0xffffe0003a764000, Tag = 0x454e4f42
ZwOpenKey DesiredAccess_unk = 0x2001f, ObjectAttributes_ptr = 0xffffd00033d29440, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d29480, KeyHandle_out = 0xffffffff80000c04, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000c04, ValueName = 87AAF9C345942AD56C43CA9DF7AC6D3E67D13B82, TitleIndex = 0x0, Type = 0x3, Data_ptr = 0xfffff800fc559d10, Data_deref_data = BINARY(offset=1998399,skipped=0,size=850), DataSize = 0x352, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba05f4c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba05f4c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28f68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa6, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba05f4c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba05f4c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28c48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000ba05f4c0, Length = 0xa4, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00033d28c48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x52, ret_val_ptr_out = 0xffffe0003af83fa0
_wcsicmp _String1 = 87AAF9C345942AD56C43CA9DF7AC6D3E67D13B82, _String2 = ImagePath, ret_val_out = -49
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af83fa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000c04, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = \Device\Tcp, DestinationString_out = \Device\Tcp
IoGetDeviceObjectPointer ObjectName = \Device\Tcp, DesiredAccess_unk = 0x1f01ff, FileObject_unk_out = 0xfffff800fc55c030, DeviceObject_unk_out = 0xfffff800fc55c028, ret_val_out = 0x0
IoCreateDevice DriverObject_unk = 0xffffe0003cbe3e60, DeviceExtensionSize = 0x0, DeviceName = \Device\Tcp1Fltnetfilter2, DeviceType_unk = 0x12, DeviceCharacteristics = 0x100, Exclusive = 0, DeviceObject_unk_out = 0xfffff800fc55c020, ret_val_out = 0x0
IoAttachDeviceToDeviceStack SourceDevice_unk = 0xffffe0003c439c20, TargetDevice_unk = 0xffffe0004c9e7d00, ret_val_unk_out = 0xffffe0004c9e7d00
RtlInitUnicodeString SourceString = \Device\Tcp6, DestinationString_out = \Device\Tcp6
IoGetDeviceObjectPointer ObjectName = \Device\Tcp6, DesiredAccess_unk = 0x1f01ff, FileObject_unk_out = 0xfffff800fc55c048, DeviceObject_unk_out = 0xfffff800fc55c040, ret_val_out = 0x0
IoCreateDevice DriverObject_unk = 0xffffe0003cbe3e60, DeviceExtensionSize = 0x0, DeviceName = \Device\Tcp61Fltnetfilter2, DeviceType_unk = 0x12, DeviceCharacteristics = 0x100, Exclusive = 0, DeviceObject_unk_out = 0xfffff800fc55c038, ret_val_out = 0x0
IoAttachDeviceToDeviceStack SourceDevice_unk = 0xffffe0003ae8fe40, TargetDevice_unk = 0xffffe0004c9e7ae0, ret_val_unk_out = 0xffffe0004c9e7ae0
RtlInitUnicodeString SourceString = \Device\Udp, DestinationString_out = \Device\Udp
IoGetDeviceObjectPointer ObjectName = \Device\Udp, DesiredAccess_unk = 0x1f01ff, FileObject_unk_out = 0xfffff800fc55c060, DeviceObject_unk_out = 0xfffff800fc55c058, ret_val_out = 0x0
IoCreateDevice DriverObject_unk = 0xffffe0003cbe3e60, DeviceExtensionSize = 0x0, DeviceName = \Device\Udp1Fltnetfilter2, DeviceType_unk = 0x12, DeviceCharacteristics = 0x100, Exclusive = 0, DeviceObject_unk_out = 0xfffff800fc55c050, ret_val_out = 0x0
IoAttachDeviceToDeviceStack SourceDevice_unk = 0xffffe0003ae849a0, TargetDevice_unk = 0xffffe0004c9e76b0, ret_val_unk_out = 0xffffe0004c9e76b0
RtlInitUnicodeString SourceString = \Device\Udp6, DestinationString_out = \Device\Udp6
IoGetDeviceObjectPointer ObjectName = \Device\Udp6, DesiredAccess_unk = 0x1f01ff, FileObject_unk_out = 0xfffff800fc55c078, DeviceObject_unk_out = 0xfffff800fc55c070, ret_val_out = 0x0
IoCreateDevice DriverObject_unk = 0xffffe0003cbe3e60, DeviceExtensionSize = 0x0, DeviceName = \Device\Udp61Fltnetfilter2, DeviceType_unk = 0x12, DeviceCharacteristics = 0x100, Exclusive = 0, DeviceObject_unk_out = 0xfffff800fc55c068, ret_val_out = 0x0
IoAttachDeviceToDeviceStack SourceDevice_unk = 0xffffe0003c697cd0, TargetDevice_unk = 0xffffe0004b328d00, ret_val_unk_out = 0xffffe0004b328d00
PsCreateSystemThread DesiredAccess = 0x0, ObjectAttributes_unk = 0x0, ProcessHandle_unk = 0x0, StartRoutine_unk = 0xfffff800fc2ba230, StartContext_ptr = 0x0, ThreadHandle_ptr_out = 0xffffd00033d294d0, ThreadHandle_out = 0xffffffff80000c04, ClientId_unk_out = 0x0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000c04, ret_val_out = 0x0
RtlInitUnicodeString SourceString = \Registry\Machine\SYSTEM\ControlSet001\Control, DestinationString_out = \Registry\Machine\SYSTEM\ControlSet001\Control
ZwOpenKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d293a0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Control, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d29488, KeyHandle_out = 0xffffffff80000c04, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000c04, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = \Registry\Machine\SYSTEM\ControlSet001\Control\NetTracepeb, DestinationString_out = \Registry\Machine\SYSTEM\ControlSet001\Control\NetTracepeb
RtlInitUnicodeString SourceString = {197EAD1F-1236-AFFC-192A-2108CED812BA}, DestinationString_out = {197EAD1F-1236-AFFC-192A-2108CED812BA}
ZwOpenKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d293a0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Control\NetTracepeb, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d29488, KeyHandle_out = 0x0, ret_val_out = 0xc0000034
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b8e43d00
ZwOpenKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d290e0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d29370, KeyHandle_out = 0xffffffff80000c04, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = ImagePath, DestinationString_out = ImagePath
ZwQueryValueKey KeyHandle_unk = 0xffffffff80000c04, ValueName = ImagePath, KeyValueInformationClass_unk = 0x2, Length = 0x0, KeyValueInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d29360, ret_val_out = 0xc0000023
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba05f4c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba05f4c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28a98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xaa, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba05f4c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba05f4c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28778, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa8, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000ba05f4c0, Length = 0xa8, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00033d28778, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x60, ret_val_ptr_out = 0xffffc000b78f2d10
ZwQueryValueKey KeyHandle_unk = 0xffffffff80000c04, ValueName = ImagePath, KeyValueInformationClass_unk = 0x2, Length = 0x60, KeyValueInformation_ptr_out = 0xffffc000b78f2d10, KeyValueInformation_deref_TitleIndex_out = 0x0, KeyValueInformation_deref_Type_out = 0x2, KeyValueInformation_deref_DataLength_out = 0x54, KeyValueInformation_deref_Data_out = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, ResultLength_ptr_out = 0xffffd00033d29360, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba05f4c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba05f4c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28a98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xaa, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba05f4c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba05f4c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28778, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa8, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000ba05f4c0, Length = 0xa8, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00033d28778, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
wcsstr _Str = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, _SubStr = \??\, ret_val_out = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys
ExFreePoolWithTag P_ptr = 0xffffc000b78f2d10, Tag = 0x0
ZwCreateFile DesiredAccess_unk = 0x10000000, ObjectAttributes_ptr = 0xffffd00033d290b0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x0, CreateDisposition = 0x1, CreateOptions = 0x10, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d29378, FileHandle_out = 0x0, IoStatusBlock_unk_out = 0xffffd00033d29110, ret_val_out = 0xc0000043
ZwClose Handle_unk = 0x0, ret_val_out = 0xc0000008
ZwClose Handle_unk = 0xffffd00033d29370, ret_val_out = 0xc0000008
ZwCreateFile DesiredAccess_unk = 0x80000000, ObjectAttributes_ptr = 0xffffd00033d29318, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x3, CreateDisposition = 0x1, CreateOptions = 0x60, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d29360, FileHandle_out = 0xffffffff800010b0, IoStatusBlock_unk_out = 0xffffd00033d292f0, ret_val_out = 0x0
ZwQueryInformationFile FileHandle_unk = 0xffffffff800010b0, Length = 0x18, FileInformationClass_unk = 0x5, IoStatusBlock_unk_out = 0xffffd00033d292f0, FileInformation_ptr_out = 0xffffd00033d29300, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff800010b0, ret_val_out = 0x0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x3af148, ret_val_ptr_out = 0xffffc000ba600000
ZwCreateFile DesiredAccess_unk = 0x80000000, ObjectAttributes_ptr = 0xffffd00033d29318, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x3, CreateDisposition = 0x1, CreateOptions = 0x60, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d29368, FileHandle_out = 0xffffffff80000aa0, IoStatusBlock_unk_out = 0xffffd00033d29308, ret_val_out = 0x0
ZwReadFile FileHandle_unk = 0xffffffff80000aa0, Event_unk = 0x0, UserApcRoutine_unk = 0x0, UserApcContext_ptr = 0x0, BufferLength = 0x3af148, ByteOffset_ptr = 0xffffd00033d29300, ByteOffset = 0, Key_ptr = 0x0, IoStatusBlock_unk_out = 0xffffd00033d29308, Buffer_ptr_out = 0xffffc000ba600000, Buffer_deref_data_out = BINARY(offset=9598025,skipped=1,size=0), ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d293a0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Control\NetTracepeb, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d29490, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d29488, Disposition_out = 0x1, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = {197EAD1F-1236-AFFC-192A-2108CED812BA}, TitleIndex = 0x0, Type = 0x3, Data_ptr = 0xffffc000ba600000, Data_deref_data = BINARY(offset=13648430,skipped=1,size=0), DataSize = 0x3af148, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2cba50, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2cba50, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28ed8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x88, ret_val_ptr_out = 0xffffe0003af95ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2cba50, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2cba50, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28bb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x86, ret_val_ptr_out = 0xffffe0003a763d70
ObQueryNameString Object_ptr = 0xffffc000ba2cba50, Length = 0x86, ObjectNameInfo_unk_out = 0xffffe0003a763d70, ReturnLength_ptr_out = 0xffffd00033d28bb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NetTracepeb, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NetTracepeb
ExFreePoolWithTag P_ptr = 0xffffe0003a763d70, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x4e, ret_val_ptr_out = 0xffffe0003af89ea0
_wcsicmp _String1 = {197EAD1F-1236-AFFC-192A-2108CED812BA}, _String2 = ImagePath, ret_val_out = 18
ExFreePoolWithTag P_ptr = 0xffffe0003af95ec0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af89ea0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExFreePoolWithTag P_ptr = 0xffffc000ba600000, Tag = 0x0
RtlFreeAnsiString AnsiString = \
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00033d29488, Interval = -1000000, ret_val_out = 0x0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000ba025e50
ZwOpenKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28d20, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb0, KeyHandle_out = 0xffffffff80001020, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = ImagePath, DestinationString_out = ImagePath
ZwQueryValueKey KeyHandle_unk = 0xffffffff80001020, ValueName = ImagePath, KeyValueInformationClass_unk = 0x2, Length = 0x0, KeyValueInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d28fa0, ret_val_out = 0xc0000023
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2cba50, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2cba50, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d286d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xaa, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2cba50, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2cba50, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d283b8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa8, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000ba2cba50, Length = 0xa8, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00033d283b8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x60, ret_val_ptr_out = 0xffffc000b9ae4310
ZwQueryValueKey KeyHandle_unk = 0xffffffff80001020, ValueName = ImagePath, KeyValueInformationClass_unk = 0x2, Length = 0x60, KeyValueInformation_ptr_out = 0xffffc000b9ae4310, KeyValueInformation_deref_TitleIndex_out = 0x0, KeyValueInformation_deref_Type_out = 0x2, KeyValueInformation_deref_DataLength_out = 0x54, KeyValueInformation_deref_Data_out = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, ResultLength_ptr_out = 0xffffd00033d28fa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2cba50, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2cba50, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d286d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xaa, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2cba50, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2cba50, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d283b8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa8, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000ba2cba50, Length = 0xa8, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00033d283b8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
wcsstr _Str = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, _SubStr = \??\, ret_val_out = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys
ExFreePoolWithTag P_ptr = 0xffffc000b9ae4310, Tag = 0x0
ZwCreateFile DesiredAccess_unk = 0x10000000, ObjectAttributes_ptr = 0xffffd00033d28cf0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x0, CreateDisposition = 0x1, CreateOptions = 0x10, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d28fb8, FileHandle_out = 0x0, IoStatusBlock_unk_out = 0xffffd00033d28d50, ret_val_out = 0xc0000043
ZwClose Handle_unk = 0x0, ret_val_out = 0xc0000008
ZwClose Handle_unk = 0xffffd00033d28fb0, ret_val_out = 0xc0000008
RtlInitUnicodeString SourceString = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, DestinationString_out = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys
ZwCreateFile DesiredAccess_unk = 0x100001, ObjectAttributes_ptr = 0xffffd00033d28b40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x3, CreateDisposition = 0x1, CreateOptions = 0x40, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d28fa0, FileHandle_out = 0xffffffff80000fbc, IoStatusBlock_unk_out = 0xffffd00033d28b70, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000fbc, ret_val_out = 0x0
RtlInitUnicodeString SourceString = \SystemRoot, DestinationString_out = \SystemRoot
ZwOpenFile DesiredAccess_unk = 0x100000, ObjectAttributes_ptr = 0xffffd00033d28f50, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \SystemRoot, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ShareAccess = 0x1, OpenOptions = 0x21, FileHandle_ptr_out = 0xffffd00033d28fa8, FileHandle_out = 0xffffffff80000fbc, IoStatusBlock_unk_out = 0xffffd00033d28f40, ret_val_out = 0x0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000fbc, DesiredAccess_unk = 0x1f01ff, ObjectType_unk = 0xffffe0003a468dc0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00033d28fb0, Object_out = 0xffffe0003b478230, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
IoQueryFileDosDeviceName FileObject_unk = 0xffffe0003b478230, ObjectNameInformation_unk_out = 0xffffd00033d28fa0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000fbc, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003b478230, ret_val_ptr_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000b813b010, Tag = 0x0
_wcsicmp _String1 = \??\C:\Windows\System32\drivers\4UonVc8lOEt4AL4JQLxQ8QpV1vO.sys, _String2 = \??\C:\Users\RDhJ0CNFevzX\Desktop\Iru.sys, ret_val_out = 2
RtlInitUnicodeString SourceString = \??\C:, DestinationString_out = \??\C:
IoCreateFile DesiredAccess_unk = 0x80100000, ObjectAttributes_ptr = 0xffffd00033d285f8, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x7, Disposition = 0x1, CreateOptions = 0x20, EaBuffer_ptr = 0x0, EaLength = 0x0, CreateFileType_unk = 0xfffff80000000000, InternalParameters_ptr = 0x0, Options = 0x100, FileHandle_ptr_out = 0xffffd00033d285f0, FileHandle_out = 0xffffffff80000fbc, IoStatusBlock_unk_out = 0xffffd00033d28cd8, ret_val_out = 0x0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000fbc, DesiredAccess_unk = 0x1, ObjectType_unk = 0xffffe0003a468dc0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00033d28628, Object_out = 0xffffe0003b478230, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003b478230, ret_val_ptr_out = 0x8000
ZwClose Handle_unk = 0xffffffff80000fbc, ret_val_out = 0x0
IoAllocateIrp StackSize = 9, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003b70a010
KeInitializeEvent Type_unk = 0x1, State = 0, Event_unk_out = 0xffffd00033d28630
ObCreateObject ObjectAttributesAccessMode_unk = 0x0, ObjectType_unk = 0xffffe0003a468dc0, ObjectAttributes_unk = 0xffffd00033d285f8, AccessMode_unk = 0x0, ParseContext_ptr = 0x0, ObjectSize = 0xd8, PagedPoolCharge = 0x0, NonPagedPoolCharge = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd00033d28c40, Object_out = 0xffffe0003b69cf20, ret_val_out = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x200, ret_val_ptr_out = 0xffffe0003a7858e0
KeInitializeEvent Type_unk = 0x1, State = 0, Event_unk_out = 0xffffe0003b69cfa0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffe0003b69cfb8
IoGetFileObjectGenericMapping ret_val_unk_out = 0xfffff80041d24660
SeCreateAccessState AccessState_unk = 0xffffd00033d28670, AuxData_unk = 0xffffd00033d287e0, Access_unk = 0xc0000000, GenericMapping_unk = 0xfffff80041d24660, ret_val_out = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0003b878030, Irp_unk = 0xffffe0003b70a010, Irp_unk_out = 0xffffe0003b70a010, ret_val_out = 0x0
KeSetEvent Event_unk = 0xffffd00033d28630, Increment_unk = 0x0, Wait = 0, Event_unk_out = 0xffffd00033d28630, ret_val_out = 0
IoFreeIrp Irp_unk = 0xffffe0003b70a010
IoAllocateIrp StackSize = 9, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003b70a010
KeInitializeEvent Type_unk = 0x1, State = 0, Event_unk_out = 0xffffd00033d28bf0
IofCallDriver DeviceObject_unk = 0xffffe0003b878030, Irp_unk = 0xffffe0003b70a010, Irp_unk_out = 0xffffe0003b70a010, ret_val_out = 0x0
KeSetEvent Event_unk = 0xffffd00033d28bf0, Increment_unk = 0x0, Wait = 0, Event_unk_out = 0xffffd00033d28bf0, ret_val_out = 0
IoFreeIrp Irp_unk = 0xffffe0003b70a010
IoAllocateIrp StackSize = 9, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003b70a010
KeInitializeEvent Type_unk = 0x1, State = 0, Event_unk_out = 0xffffd00033d28bf0
IofCallDriver DeviceObject_unk = 0xffffe0003b878030, Irp_unk = 0xffffe0003b70a010, Irp_unk_out = 0xffffe0003b70a010, ret_val_out = 0x0
KeSetEvent Event_unk = 0xffffd00033d28bf0, Increment_unk = 0x0, Wait = 0, Event_unk_out = 0xffffd00033d28bf0, ret_val_out = 0
IoFreeIrp Irp_unk = 0xffffe0003b70a010
ObfDereferenceObject Object_ptr = 0xffffe0003b69cf20, ret_val_ptr_out = 0x0
ZwOpenKey DesiredAccess_unk = 0x10000000, ObjectAttributes_ptr = 0xffffd00033d28f40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb0, KeyHandle_out = 0xffffffff80000fbc, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwQueryKey KeyHandle_unk = 0xffffffff80000fbc, KeyInformationClass_unk = 0x2, Length = 0x0, KeyInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d28fa8, ret_val_out = 0xc0000023
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePoolWithTag PoolType_unk = 0x1, NumberOfBytes_ptr = 0x2c, Tag = 0x52454753, ret_val_ptr_out = 0xffffc000ba4d29f0
ZwQueryKey KeyHandle_unk = 0xffffffff80000fbc, KeyInformationClass_unk = 0x2, Length = 0x2c, KeyInformation_ptr_out = 0xffffc000ba4d29f0, ResultLength_ptr_out = 0xffffd00033d28fa8, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwEnumerateKey KeyHandle_unk = 0xffffffff80000fbc, Index = 0x0, KeyInformationClass_unk = 0x0, Length = 0x0, KeyInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d28fa8, ret_val_out = 0xc0000023
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePoolWithTag PoolType_unk = 0x1, NumberOfBytes_ptr = 0x22, Tag = 0x52454753, ret_val_ptr_out = 0xffffc000ba532670
ZwEnumerateKey KeyHandle_unk = 0xffffffff80000fbc, Index = 0x0, KeyInformationClass_unk = 0x0, Length = 0x22, KeyInformation_ptr_out = 0xffffc000ba532670, ResultLength_ptr_out = 0xffffd00033d28fa8, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePoolWithTag PoolType_unk = 0x1, NumberOfBytes_ptr = 0xac, Tag = 0x52454753, ret_val_ptr_out = 0xffffc000ba17ed90
RtlInitUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO\Instances, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO\Instances
ZwOpenKey DesiredAccess_unk = 0x10000000, ObjectAttributes_ptr = 0xffffd00033d28ea0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO\Instances, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d28f10, KeyHandle_out = 0xffffffff80001098, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwQueryKey KeyHandle_unk = 0xffffffff80001098, KeyInformationClass_unk = 0x2, Length = 0x0, KeyInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d28f08, ret_val_out = 0xc0000023
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePoolWithTag PoolType_unk = 0x1, NumberOfBytes_ptr = 0x2c, Tag = 0x52454753, ret_val_ptr_out = 0xffffc000ba25ec50
ZwQueryKey KeyHandle_unk = 0xffffffff80001098, KeyInformationClass_unk = 0x2, Length = 0x2c, KeyInformation_ptr_out = 0xffffc000ba25ec50, ResultLength_ptr_out = 0xffffd00033d28f08, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwEnumerateKey KeyHandle_unk = 0xffffffff80001098, Index = 0x0, KeyInformationClass_unk = 0x0, Length = 0x0, KeyInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d28f08, ret_val_out = 0xc0000023
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePoolWithTag PoolType_unk = 0x1, NumberOfBytes_ptr = 0x58, Tag = 0x52454753, ret_val_ptr_out = 0xffffc000b9ae4310
ZwEnumerateKey KeyHandle_unk = 0xffffffff80001098, Index = 0x0, KeyInformationClass_unk = 0x0, Length = 0x58, KeyInformation_ptr_out = 0xffffc000b9ae4310, ResultLength_ptr_out = 0xffffd00033d28f08, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePoolWithTag PoolType_unk = 0x1, NumberOfBytes_ptr = 0xf6, Tag = 0x52454753, ret_val_ptr_out = 0xffffc000b9c8c840
RtlInitUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO\Instances\4UonVc8lOEt4AL4JQLxQ8QpV1vO Instance, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO\Instances\4UonVc8lOEt4AL4JQLxQ8QpV1vO Instance
ZwOpenKey DesiredAccess_unk = 0x10000000, ObjectAttributes_ptr = 0xffffd00033d28e00, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\4UonVc8lOEt4AL4JQLxQ8QpV1vO\Instances\4UonVc8lOEt4AL4JQLxQ8QpV1vO Instance, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d28e70, KeyHandle_out = 0xffffffff80000a88, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwQueryKey KeyHandle_unk = 0xffffffff80000a88, KeyInformationClass_unk = 0x2, Length = 0x0, KeyInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d28e68, ret_val_out = 0xc0000023
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePoolWithTag PoolType_unk = 0x1, NumberOfBytes_ptr = 0x2c, Tag = 0x52454753, ret_val_ptr_out = 0xffffc000b8696f50
ZwQueryKey KeyHandle_unk = 0xffffffff80000a88, KeyInformationClass_unk = 0x2, Length = 0x2c, KeyInformation_ptr_out = 0xffffc000b8696f50, ResultLength_ptr_out = 0xffffd00033d28e68, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwDeleteKey KeyHandle_unk = 0xffffffff80000a88, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExFreePoolWithTag P_ptr = 0xffffc000b8696f50, Tag = 0x0
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExFreePoolWithTag P_ptr = 0xffffc000b9ae4310, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000b9c8c840, Tag = 0x0
ZwDeleteKey KeyHandle_unk = 0xffffffff80001098, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExFreePoolWithTag P_ptr = 0xffffc000ba25ec50, Tag = 0x0
ZwClose Handle_unk = 0xffffffff80001098, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExFreePoolWithTag P_ptr = 0xffffc000ba532670, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000ba17ed90, Tag = 0x0
ZwDeleteKey KeyHandle_unk = 0xffffffff80000fbc, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExFreePoolWithTag P_ptr = 0xffffc000ba4d29f0, Tag = 0x0
ZwClose Handle_unk = 0xffffffff80000fbc, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b8567010
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000ba1495b0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b8fbc110
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b83dbbe0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000ba12f220
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b9323ef0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b8e43d00
ExSystemTimeToLocalTime SystemTime_ptr = 0xffffd00033d28be8, LocalTime_ptr_out = 0xffffd00033d28bf0
RtlTimeToTimeFields Time_ptr = 0xffffd00033d28bf0, TimeFields_unk_out = 0xffffd00033d28b90
RtlInitUnicodeString SourceString = \SystemRoot, DestinationString_out = \SystemRoot
ZwOpenFile DesiredAccess_unk = 0x100000, ObjectAttributes_ptr = 0xffffd00033d28b90, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \SystemRoot, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ShareAccess = 0x1, OpenOptions = 0x21, FileHandle_ptr_out = 0xffffd00033d28be8, FileHandle_out = 0xffffffff80000fbc, IoStatusBlock_unk_out = 0xffffd00033d28b80, ret_val_out = 0x0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000fbc, DesiredAccess_unk = 0x1f01ff, ObjectType_unk = 0xffffe0003a468dc0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00033d28bf0, Object_out = 0xffffe0003b478230, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
IoQueryFileDosDeviceName FileObject_unk = 0xffffe0003b478230, ObjectNameInformation_unk_out = 0xffffd00033d28be0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000fbc, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003b478230, ret_val_ptr_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000b90decd0, Tag = 0x0
RtlInitUnicodeString SourceString = \??\C:\Windows\System32\drivers\Cpv.sys, DestinationString_out = \??\C:\Windows\System32\drivers\Cpv.sys
RtlInitUnicodeString SourceString = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv
ZwOpenKey DesiredAccess_unk = 0x10000000, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fa0, KeyHandle_out = 0x0, ret_val_out = 0xc0000034
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = \??\C:\Windows\System32\drivers\Cpv.sys, DestinationString_out = \??\C:\Windows\System32\drivers\Cpv.sys
ZwCreateFile DesiredAccess_unk = 0x100001, ObjectAttributes_ptr = 0xffffd00033d28780, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Windows\System32\drivers\Cpv.sys, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x3, CreateDisposition = 0x1, CreateOptions = 0x40, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d28be0, FileHandle_out = 0x0, IoStatusBlock_unk_out = 0xffffd00033d287b0, ret_val_out = 0xc0000034
RtlInitUnicodeString SourceString = DependOnService, DestinationString_out = DependOnService
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb8, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d28fa8, Disposition_out = 0x1, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = DependOnService, TitleIndex = 0x0, Type = 0x1, Data = FltMgr, DataSize = 0xe, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = DependOnService, _String2 = ImagePath, ret_val_out = -5
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = ImagePath, DestinationString_out = ImagePath
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb8, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d28fa8, Disposition_out = 0x2, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = ImagePath, TitleIndex = 0x0, Type = 0x2, Data = \SystemRoot\System32\drivers\Cpv.sys, DataSize = 0x4a, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x14, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = ImagePath, _String2 = ImagePath, ret_val_out = 0
ZwOpenKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d284a8, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d284a0, KeyHandle_out = 0xffffffff80001098, ret_val_out = 0x0
RtlInitUnicodeString SourceString = wdpRkDataListA, DestinationString_out = wdpRkDataListA
ZwQueryValueKey KeyHandle_unk = 0xffffffff80001098, ValueName = wdpRkDataListA, KeyValueInformationClass_unk = 0x2, Length = 0x0, KeyValueInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000034
ZwClose Handle_unk = 0xffffffff80001098, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = Group, DestinationString_out = Group
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb8, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d28fa8, Disposition_out = 0x2, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = Group, TitleIndex = 0x0, Type = 0x2, Data = System Reserved, DataSize = 0x20, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = Group, _String2 = ImagePath, ret_val_out = -2
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = ErrorControl, DestinationString_out = ErrorControl
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb8, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d28fa8, Disposition_out = 0x2, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = ErrorControl, TitleIndex = 0x0, Type = 0x4, Data_ptr = 0xffffd00033d28d50, Data = 0x1, DataSize = 0x4, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1a, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = ErrorControl, _String2 = ImagePath, ret_val_out = -4
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = Start, DestinationString_out = Start
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb8, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d28fa8, Disposition_out = 0x2, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = Start, TitleIndex = 0x0, Type = 0x4, Data_ptr = 0xffffd00033d28d50, Data = 0x0, DataSize = 0x4, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = Start, _String2 = ImagePath, ret_val_out = 10
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = Type, DestinationString_out = Type
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb8, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d28fa8, Disposition_out = 0x2, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = Type, TitleIndex = 0x0, Type = 0x4, Data_ptr = 0xffffd00033d28d50, Data = 0x1, DataSize = 0x4, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = Type, _String2 = ImagePath, ret_val_out = 11
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv\Instances, DestinationString_out = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv\Instances
RtlInitUnicodeString SourceString = DefaultInstance, DestinationString_out = DefaultInstance
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv\Instances, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb8, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d28fa8, Disposition_out = 0x1, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = DefaultInstance, TitleIndex = 0x0, Type = 0x1, Data = Cpv Instance, DataSize = 0x1a, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8e, ret_val_ptr_out = 0xffffe0003af95ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8c, ret_val_ptr_out = 0xffffe0003a763d70
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x8c, ObjectNameInfo_unk_out = 0xffffe0003a763d70, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv\Instances, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv\Instances
ExFreePoolWithTag P_ptr = 0xffffe0003a763d70, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = DefaultInstance, _String2 = ImagePath, ret_val_out = -5
ExFreePoolWithTag P_ptr = 0xffffe0003af95ec0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv\Instances\Cpv Instance, DestinationString_out = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv\Instances\Cpv Instance
RtlInitUnicodeString SourceString = Altitude, DestinationString_out = Altitude
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv\Instances\Cpv Instance, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb8, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d28fa8, Disposition_out = 0x1, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = Altitude, TitleIndex = 0x0, Type = 0x1, Data = 399996, DataSize = 0xe, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa8, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa6, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0xa6, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv\Instances\Cpv Instance, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv\Instances\Cpv Instance
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x12, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = Altitude, _String2 = ImagePath, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = Flags, DestinationString_out = Flags
ZwCreateKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv\Instances\Cpv Instance, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, TitleIndex = 0x0, Class_ptr = 0x0, CreateOptions = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb8, KeyHandle_out = 0xffffffff80000aa0, Disposition_ptr_out = 0xffffd00033d28fa8, Disposition_out = 0x2, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwSetValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = Flags, TitleIndex = 0x0, Type = 0x4, Data_ptr = 0xffffd00033d28d50, Data = 0x0, DataSize = 0x4, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28758, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa8, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa6, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0xa6, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00033d28438, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv\Instances\Cpv Instance, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv\Instances\Cpv Instance
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = Flags, _String2 = ImagePath, ret_val_out = -3
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwFlushKey KeyHandle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = \Registry\Machine\SYSTEM\ControlSet001\Control\NetTracepeb, DestinationString_out = \Registry\Machine\SYSTEM\ControlSet001\Control\NetTracepeb
RtlInitUnicodeString SourceString = {197EAD1F-1236-AFFC-192A-2108CED812BA}, DestinationString_out = {197EAD1F-1236-AFFC-192A-2108CED812BA}
ZwOpenKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Control\NetTracepeb, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fa8, KeyHandle_out = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwQueryValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = {197EAD1F-1236-AFFC-192A-2108CED812BA}, KeyValueInformationClass_unk = 0x2, Length = 0x4, KeyValueInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d28fa0, ret_val_out = 0xc0000023
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28638, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x88, ret_val_ptr_out = 0xffffe0003af95ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28318, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x86, ret_val_ptr_out = 0xffffe0003a763d70
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x86, ObjectNameInfo_unk_out = 0xffffe0003a763d70, ReturnLength_ptr_out = 0xffffd00033d28318, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NetTracepeb, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NetTracepeb
ExFreePoolWithTag P_ptr = 0xffffe0003a763d70, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af95ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x3af154, ret_val_ptr_out = 0xffffc000bae00000
ZwOpenKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28c40, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Control\NetTracepeb, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fa8, KeyHandle_out = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwQueryValueKey KeyHandle_unk = 0xffffffff80000aa0, ValueName = {197EAD1F-1236-AFFC-192A-2108CED812BA}, KeyValueInformationClass_unk = 0x2, Length = 0x3af154, KeyValueInformation_ptr_out = 0xffffc000bae00000, KeyValueInformation_deref_TitleIndex_out = 0x0, KeyValueInformation_deref_Type_out = 0x3, KeyValueInformation_deref_DataLength_out = 0x3af148, KeyValueInformation_deref_Data_ptr_out = 0xffffc000bae0000c, KeyValueInformation_deref_Data_deref_data_out = BINARY(offset=24573984,skipped=1,size=0), ResultLength_ptr_out = 0xffffd00033d28fa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28638, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x88, ret_val_ptr_out = 0xffffe0003af95ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9d01060, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d28318, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x86, ret_val_ptr_out = 0xffffe0003a763d70
ObQueryNameString Object_ptr = 0xffffc000b9d01060, Length = 0x86, ObjectNameInfo_unk_out = 0xffffe0003a763d70, ReturnLength_ptr_out = 0xffffd00033d28318, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NetTracepeb, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NetTracepeb
ExFreePoolWithTag P_ptr = 0xffffe0003a763d70, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af95ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ZwCreateFile DesiredAccess_unk = 0x10000000, ObjectAttributes_ptr = 0xffffd00033d28b98, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Windows\System32\drivers\Cpv.sys, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x3, CreateDisposition = 0x5, CreateOptions = 0x60, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d28be0, FileHandle_out = 0xffffffff80000aa0, IoStatusBlock_unk_out = 0xffffd00033d28b88, ret_val_out = 0x0
ZwWriteFile FileHandle_unk = 0xffffffff80000aa0, Event_unk = 0x0, ApcRoutine_unk = 0x0, ApcContext_ptr = 0x0, Buffer_ptr = 0xffffc000bae0000c, Buffer_deref_data = BINARY(offset=28384162,skipped=1,size=0), Length = 0x3af148, ByteOffset_ptr = 0xffffd00033d28b80, ByteOffset = 0, Key_ptr = 0x0, IoStatusBlock_unk_out = 0xffffd00033d28b88, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = \??\C:\Windows\System32, DestinationString_out = \??\C:\Windows\System32
ZwCreateFile DesiredAccess_unk = 0x80000000, ObjectAttributes_ptr = 0xffffd00033d28cf0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Windows\System32, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x0, ShareAccess = 0x1, CreateDisposition = 0x1, CreateOptions = 0x20, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d28fb0, FileHandle_out = 0xffffffff80000aa0, IoStatusBlock_unk_out = 0xffffd00033d28cd0, ret_val_out = 0x0
ZwQueryInformationFile FileHandle_unk = 0xffffffff80000aa0, Length = 0x28, FileInformationClass_unk = 0x4, IoStatusBlock_unk_out = 0xffffd00033d28cd0, FileInformation_ptr_out = 0xffffd00033d28c40, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = \??\C:\Windows\System32\drivers\Cpv.sys, DestinationString_out = \??\C:\Windows\System32\drivers\Cpv.sys
ZwCreateFile DesiredAccess_unk = 0x80000000, ObjectAttributes_ptr = 0xffffd00033d28cf0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Windows\System32\drivers\Cpv.sys, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x0, ShareAccess = 0x1, CreateDisposition = 0x1, CreateOptions = 0x20, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d28fb0, FileHandle_out = 0xffffffff80000aa0, IoStatusBlock_unk_out = 0xffffd00033d28cd0, ret_val_out = 0x0
ZwQueryInformationFile FileHandle_unk = 0xffffffff80000aa0, Length = 0x28, FileInformationClass_unk = 0x4, IoStatusBlock_unk_out = 0xffffd00033d28cd0, FileInformation_ptr_out = 0xffffd00033d28d20, ret_val_out = 0x0
ZwSetInformationFile FileHandle_unk = 0xffffffff80000aa0, IoStatusBlock_unk = 0xffffd00033d28cd0, FileInformation_ptr = 0xffffd00033d28d20, Length = 0x28, FileInformationClass_unk = 0x4, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000aa0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000b9db2560, Tag = 0x0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x68, ret_val_ptr_out = 0xffffc000b7f0ac50
ExFreePoolWithTag P_ptr = 0xffffc000bae00000, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000b8567010, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000ba1495b0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000b8fbc110, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000b83dbbe0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000ba12f220, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000b9323ef0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000b8e43d00, Tag = 0x0
ZwOpenKey DesiredAccess_unk = 0xf003f, ObjectAttributes_ptr = 0xffffd00033d28d20, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Registry\Machine\SYSTEM\ControlSet001\Services\Cpv, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, KeyHandle_ptr_out = 0xffffd00033d28fb0, KeyHandle_out = 0xffffffff80000fdc, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
RtlInitUnicodeString SourceString = ImagePath, DestinationString_out = ImagePath
ZwQueryValueKey KeyHandle_unk = 0xffffffff80000fdc, ValueName = ImagePath, KeyValueInformationClass_unk = 0x2, Length = 0x0, KeyValueInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d28fa0, ret_val_out = 0xc0000023
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba534be0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba534be0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d286d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba534be0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba534be0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d283b8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000ba534be0, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd00033d283b8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x56, ret_val_ptr_out = 0xffffc000ba0acf50
ZwQueryValueKey KeyHandle_unk = 0xffffffff80000fdc, ValueName = ImagePath, KeyValueInformationClass_unk = 0x2, Length = 0x56, KeyValueInformation_ptr_out = 0xffffc000ba0acf50, KeyValueInformation_deref_TitleIndex_out = 0x0, KeyValueInformation_deref_Type_out = 0x2, KeyValueInformation_deref_DataLength_out = 0x4a, KeyValueInformation_deref_Data_out = \SystemRoot\System32\drivers\Cpv.sys, ResultLength_ptr_out = 0xffffd00033d28fa0, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba534be0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba534be0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d286d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba534be0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba534be0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00033d283b8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000ba534be0, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd00033d283b8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
wcsstr _Str = \SystemRoot\System32\drivers\Cpv.sys, _SubStr = \??\
RtlInitUnicodeString SourceString = \SystemRoot, DestinationString_out = \SystemRoot
ZwOpenFile DesiredAccess_unk = 0x100000, ObjectAttributes_ptr = 0xffffd00033d28c30, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \SystemRoot, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ShareAccess = 0x1, OpenOptions = 0x21, FileHandle_ptr_out = 0xffffd00033d28c88, FileHandle_out = 0xffffffff80000bb8, IoStatusBlock_unk_out = 0xffffd00033d28c20, ret_val_out = 0x0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000bb8, DesiredAccess_unk = 0x1f01ff, ObjectType_unk = 0xffffe0003a468dc0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00033d28c90, Object_out = 0xffffe0003b6bf3a0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
IoQueryFileDosDeviceName FileObject_unk = 0xffffe0003b6bf3a0, ObjectNameInformation_unk_out = 0xffffd00033d28c80, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000bb8, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003b6bf3a0, ret_val_ptr_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000ba13fd00, Tag = 0x0
RtlAppendUnicodeToString Source = \??\, Destination_out = \??\, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \??\, Source = C:\Windows, Destination_out = \??\C:\Windows, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \??\C:\Windows, Source = \System32\drivers, Destination_out = \??\C:\Windows\System32\drivers, ret_val_out = 0x0
RtlAppendUnicodeToString Destination = \??\C:\Windows\System32\drivers, Source = \Cpv.sys, Destination_out = \??\C:\Windows\System32\drivers\Cpv.sys, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffc000ba0acf50, Tag = 0x0
ZwCreateFile DesiredAccess_unk = 0x10000000, ObjectAttributes_ptr = 0xffffd00033d28cf0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Windows\System32\drivers\Cpv.sys, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x0, CreateDisposition = 0x1, CreateOptions = 0x10, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd00033d28fb8, FileHandle_out = 0xffffffff80000bb8, IoStatusBlock_unk_out = 0xffffd00033d28d50, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000bb8, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffd00033d28fb0, ret_val_out = 0xc0000008
ZwCreateFile DesiredAccess_unk = 0x80000000, ObjectAttributes_ptr = 0xffffd00033d29020, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Windows\System32\drivers\Cpv.sys, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x0, ShareAccess = 0x0, CreateDisposition = 0x1, CreateOptions = 0x20, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xfffff800fc55af60, FileHandle_out = 0xffffffff80000bb8, IoStatusBlock_unk_out = 0xffffd00033d29010, ret_val_out = 0x0
ZwQuerySystemInformation SystemInformationClass_unk = 0x5, Length_ptr = 0x0, SystemInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d29480, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1ef78, ret_val_ptr_out = 0xffffe0003af96000
ZwQuerySystemInformation SystemInformationClass_unk = 0x5, Length_ptr = 0x1ef78, SystemInformation_ptr_out = 0xffffe0003af96000, ResultLength_ptr_out = 0xffffd00033d29480, ret_val_out = 0xc0000004
ExFreePoolWithTag P_ptr = 0xffffe0003af96000, Tag = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00033d29480, Interval = -10000000, ret_val_out = 0x0
ZwQuerySystemInformation SystemInformationClass_unk = 0x5, Length_ptr = 0x0, SystemInformation_ptr_out = 0x0, ResultLength_ptr_out = 0xffffd00033d29480, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1ed98, ret_val_ptr_out = 0xffffe0003c8ca000
ZwQuerySystemInformation SystemInformationClass_unk = 0x5, Length_ptr = 0x1ed98, SystemInformation_ptr_out = 0xffffe0003c8ca000, ResultLength_ptr_out = 0xffffd00033d29480, ret_val_out = 0x0
PsLookupProcessByProcessId ProcessId_unk = 0x0, Process_unk_out = 0xffffd00033d29488, ret_val_out = 0xc000000b
PsLookupProcessByProcessId ProcessId_unk = 0x4, Process_unk_out = 0xffffd00033d29488, ret_val_out = 0x0
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
For performance reasons, the remaining entries are omitted.
Click to download all entries as text file.
Code Block #7 (EP #177)
»
Information Value
Trigger KiInterruptDispatchNoLockNoEtw+0x1dc
Start Address 0xfffff800fc2cb1c0
Execution Path #177 (length: 899, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 899
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c21f350
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c21f350, MemoryDescriptorList_unk_out = 0xffffe0003c21f350
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c21f350, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00037d3ea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00037d3ea40, MemoryDescriptorList_unk = 0xffffe0003c21f350
IoFreeMdl Mdl_unk = 0xffffe0003c21f350
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0004aff7370
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0004aff7370, MemoryDescriptorList_unk_out = 0xffffe0004aff7370
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0004aff7370, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00045bbaa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00045bbaa40, MemoryDescriptorList_unk = 0xffffe0004aff7370
IoFreeMdl Mdl_unk = 0xffffe0004aff7370
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c21f350
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c21f350, MemoryDescriptorList_unk_out = 0xffffe0003c21f350
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c21f350, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00049b7ea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00049b7ea40, MemoryDescriptorList_unk = 0xffffe0003c21f350
IoFreeMdl Mdl_unk = 0xffffe0003c21f350
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c067610
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c067610, MemoryDescriptorList_unk_out = 0xffffe0003c067610
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c067610, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd000292dea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd000292dea40, MemoryDescriptorList_unk = 0xffffe0003c067610
IoFreeMdl Mdl_unk = 0xffffe0003c067610
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b096970
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b096970, MemoryDescriptorList_unk_out = 0xffffe0003b096970
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b096970, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b55ea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b55ea40, MemoryDescriptorList_unk = 0xffffe0003b096970
IoFreeMdl Mdl_unk = 0xffffe0003b096970
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9bd520
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9bd520, MemoryDescriptorList_unk_out = 0xffffe0003b9bd520
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9bd520, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002bb3ea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bb3ea40, MemoryDescriptorList_unk = 0xffffe0003b9bd520
IoFreeMdl Mdl_unk = 0xffffe0003b9bd520
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8750
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8750, MemoryDescriptorList_unk_out = 0xffffe0003c1f8750
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8750, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002be1aa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002be1aa40, MemoryDescriptorList_unk = 0xffffe0003c1f8750
IoFreeMdl Mdl_unk = 0xffffe0003c1f8750
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b096970
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b096970, MemoryDescriptorList_unk_out = 0xffffe0003b096970
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b096970, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002bf30a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bf30a40, MemoryDescriptorList_unk = 0xffffe0003b096970
IoFreeMdl Mdl_unk = 0xffffe0003b096970
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c6a9a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c6a9a40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c067610
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c067610, MemoryDescriptorList_unk_out = 0xffffe0003c067610
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c067610, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002d0aba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d0aba40, MemoryDescriptorList_unk = 0xffffe0003c067610
IoFreeMdl Mdl_unk = 0xffffe0003c067610
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c067610
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c067610, MemoryDescriptorList_unk_out = 0xffffe0003c067610
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c067610, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002e443a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e443a40, MemoryDescriptorList_unk = 0xffffe0003c067610
IoFreeMdl Mdl_unk = 0xffffe0003c067610
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c067610
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c067610, MemoryDescriptorList_unk_out = 0xffffe0003c067610
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c067610, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002e906a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e906a40, MemoryDescriptorList_unk = 0xffffe0003c067610
IoFreeMdl Mdl_unk = 0xffffe0003c067610
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000463fe010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000463fe010, MemoryDescriptorList_unk_out = 0xffffe000463fe010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000463fe010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002f8dea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f8dea40, MemoryDescriptorList_unk = 0xffffe000463fe010
IoFreeMdl Mdl_unk = 0xffffe000463fe010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0004cbc3820
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0004cbc3820, MemoryDescriptorList_unk_out = 0xffffe0004cbc3820
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0004cbc3820, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00045a5da40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00045a5da40, MemoryDescriptorList_unk = 0xffffe0004cbc3820
IoFreeMdl Mdl_unk = 0xffffe0004cbc3820
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c37eba0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c37eba0, MemoryDescriptorList_unk_out = 0xffffe0003c37eba0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c37eba0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00045ba6a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00045ba6a40, MemoryDescriptorList_unk = 0xffffe0003c37eba0
IoFreeMdl Mdl_unk = 0xffffe0003c37eba0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9bd520
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9bd520, MemoryDescriptorList_unk_out = 0xffffe0003b9bd520
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9bd520, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00049b8da40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00049b8da40, MemoryDescriptorList_unk = 0xffffe0003b9bd520
IoFreeMdl Mdl_unk = 0xffffe0003b9bd520
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9bd520
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9bd520, MemoryDescriptorList_unk_out = 0xffffe0003b9bd520
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9bd520, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00028f98a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00028f98a40, MemoryDescriptorList_unk = 0xffffe0003b9bd520
IoFreeMdl Mdl_unk = 0xffffe0003b9bd520
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcb2440
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcb2440, MemoryDescriptorList_unk_out = 0xffffe0003bcb2440
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029479a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029479a40, MemoryDescriptorList_unk = 0xffffe0003bcb2440
IoFreeMdl Mdl_unk = 0xffffe0003bcb2440
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c0f9c50
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c0f9c50, MemoryDescriptorList_unk_out = 0xffffe0003c0f9c50
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c0f9c50, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029627a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029627a40, MemoryDescriptorList_unk = 0xffffe0003c0f9c50
IoFreeMdl Mdl_unk = 0xffffe0003c0f9c50
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c0f9c50
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c0f9c50, MemoryDescriptorList_unk_out = 0xffffe0003c0f9c50
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c0f9c50, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029710a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029710a40, MemoryDescriptorList_unk = 0xffffe0003c0f9c50
IoFreeMdl Mdl_unk = 0xffffe0003c0f9c50
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c0f9c50
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c0f9c50, MemoryDescriptorList_unk_out = 0xffffe0003c0f9c50
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c0f9c50, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002971ea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002971ea40, MemoryDescriptorList_unk = 0xffffe0003c0f9c50
IoFreeMdl Mdl_unk = 0xffffe0003c0f9c50
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c0f9c50
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c0f9c50, MemoryDescriptorList_unk_out = 0xffffe0003c0f9c50
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c0f9c50, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029739a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029739a40, MemoryDescriptorList_unk = 0xffffe0003c0f9c50
IoFreeMdl Mdl_unk = 0xffffe0003c0f9c50
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c0f9c50
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c0f9c50, MemoryDescriptorList_unk_out = 0xffffe0003c0f9c50
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c0f9c50, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029a18a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029a18a40, MemoryDescriptorList_unk = 0xffffe0003c0f9c50
IoFreeMdl Mdl_unk = 0xffffe0003c0f9c50
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c0f9c50
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c0f9c50, MemoryDescriptorList_unk_out = 0xffffe0003c0f9c50
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c0f9c50, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029a24a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029a24a40, MemoryDescriptorList_unk = 0xffffe0003c0f9c50
IoFreeMdl Mdl_unk = 0xffffe0003c0f9c50
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029a2ba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029a2ba40, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029a42a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029a42a40, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcb2440
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcb2440, MemoryDescriptorList_unk_out = 0xffffe0003bcb2440
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029cdda40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029cdda40, MemoryDescriptorList_unk = 0xffffe0003bcb2440
IoFreeMdl Mdl_unk = 0xffffe0003bcb2440
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029e21a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029e21a40, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a0f3a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a0f3a40, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a0fba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a0fba40, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a109a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a109a40, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a110a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a110a40, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a119a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a119a40, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcb2440
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcb2440, MemoryDescriptorList_unk_out = 0xffffe0003bcb2440
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a256a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a256a40, MemoryDescriptorList_unk = 0xffffe0003bcb2440
IoFreeMdl Mdl_unk = 0xffffe0003bcb2440
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a4d8a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a4d8a40, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c306640, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a4fea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a4fea40, MemoryDescriptorList_unk = 0xffffe0003c306640
IoFreeMdl Mdl_unk = 0xffffe0003c306640
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c306640, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a65fa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a65fa40, MemoryDescriptorList_unk = 0xffffe0003c306640
IoFreeMdl Mdl_unk = 0xffffe0003c306640
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd56930
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd56930, MemoryDescriptorList_unk_out = 0xffffe0003bd56930
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd56930, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a68aa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a68aa40, MemoryDescriptorList_unk = 0xffffe0003bd56930
IoFreeMdl Mdl_unk = 0xffffe0003bd56930
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a69aa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a69aa40, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a897a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a897a40, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a89ba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a89ba40, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a8b2a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a8b2a40, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a8cfa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a8cfa40, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002ab0da40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ab0da40, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002ab11a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ab11a40, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002ab13a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ab13a40, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002ab15a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ab15a40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002ab4da40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ab4da40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002add0a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002add0a40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002ae3da40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ae3da40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002ae6ca40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ae6ca40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003a4ae280
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003a4ae280, MemoryDescriptorList_unk_out = 0xffffe0003a4ae280
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003a4ae280, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002af4ea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002af4ea40, MemoryDescriptorList_unk = 0xffffe0003a4ae280
IoFreeMdl Mdl_unk = 0xffffe0003a4ae280
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003a4ae280
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003a4ae280, MemoryDescriptorList_unk_out = 0xffffe0003a4ae280
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003a4ae280, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002af54a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002af54a40, MemoryDescriptorList_unk = 0xffffe0003a4ae280
IoFreeMdl Mdl_unk = 0xffffe0003a4ae280
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002af63a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002af63a40, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003a4ae280
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003a4ae280, MemoryDescriptorList_unk_out = 0xffffe0003a4ae280
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003a4ae280, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b0e2a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b0e2a40, MemoryDescriptorList_unk = 0xffffe0003a4ae280
IoFreeMdl Mdl_unk = 0xffffe0003a4ae280
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003a4ae280
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003a4ae280, MemoryDescriptorList_unk_out = 0xffffe0003a4ae280
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003a4ae280, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b0eba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b0eba40, MemoryDescriptorList_unk = 0xffffe0003a4ae280
IoFreeMdl Mdl_unk = 0xffffe0003a4ae280
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b1d7a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b1d7a40, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b1d9a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b1d9a40, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b1dea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b1dea40, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b1eea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b1eea40, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b5aea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b5aea40, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b5bda40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b5bda40, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b5c0a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b5c0a40, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b699a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b699a40, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b6a6a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b6a6a40, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b8a5a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b8a5a40, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b8aea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b8aea40, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b8afa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b8afa40, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1fc4c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1fc4c0, MemoryDescriptorList_unk_out = 0xffffe0003c1fc4c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1fc4c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b8d5a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b8d5a40, MemoryDescriptorList_unk = 0xffffe0003c1fc4c0
IoFreeMdl Mdl_unk = 0xffffe0003c1fc4c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c270490
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c270490, MemoryDescriptorList_unk_out = 0xffffe0003c270490
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c270490, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002ba34a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ba34a40, MemoryDescriptorList_unk = 0xffffe0003c270490
IoFreeMdl Mdl_unk = 0xffffe0003c270490
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c270490
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c270490, MemoryDescriptorList_unk_out = 0xffffe0003c270490
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c270490, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002ba3da40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ba3da40, MemoryDescriptorList_unk = 0xffffe0003c270490
IoFreeMdl Mdl_unk = 0xffffe0003c270490
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b494460
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b494460, MemoryDescriptorList_unk_out = 0xffffe0003b494460
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b494460, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002bc3ba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bc3ba40, MemoryDescriptorList_unk = 0xffffe0003b494460
IoFreeMdl Mdl_unk = 0xffffe0003b494460
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0004aff7370
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0004aff7370, MemoryDescriptorList_unk_out = 0xffffe0004aff7370
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0004aff7370, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002bc50a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bc50a40, MemoryDescriptorList_unk = 0xffffe0004aff7370
IoFreeMdl Mdl_unk = 0xffffe0004aff7370
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c251f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c251f40, MemoryDescriptorList_unk_out = 0xffffe0003c251f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c251f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002be97a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002be97a40, MemoryDescriptorList_unk = 0xffffe0003c251f40
IoFreeMdl Mdl_unk = 0xffffe0003c251f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003f9b4870
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003f9b4870, MemoryDescriptorList_unk_out = 0xffffe0003f9b4870
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003f9b4870, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002be99a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002be99a40, MemoryDescriptorList_unk = 0xffffe0003f9b4870
IoFreeMdl Mdl_unk = 0xffffe0003f9b4870
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002bfb4a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bfb4a40, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002bfb6a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bfb6a40, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002bfc1a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bfc1a40, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c01ba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c01ba40, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c2a4a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c2a4a40, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c2b1a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c2b1a40, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461f8890
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461f8890, MemoryDescriptorList_unk_out = 0xffffe000461f8890
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000461f8890, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c2b3a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c2b3a40, MemoryDescriptorList_unk = 0xffffe000461f8890
IoFreeMdl Mdl_unk = 0xffffe000461f8890
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c2caa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c2caa40, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c328a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c328a40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c376a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c376a40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c590a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c590a40, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c58d010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c58d010, MemoryDescriptorList_unk_out = 0xffffe0003c58d010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c58d010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c5a2a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c5a2a40, MemoryDescriptorList_unk = 0xffffe0003c58d010
IoFreeMdl Mdl_unk = 0xffffe0003c58d010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c6b1a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c6b1a40, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c86fa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c86fa40, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c872a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c872a40, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002d03fa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d03fa40, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002d040a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d040a40, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002d1b1a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d1b1a40, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473be010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473be010, MemoryDescriptorList_unk_out = 0xffffe000473be010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002d1e0a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d1e0a40, MemoryDescriptorList_unk = 0xffffe000473be010
IoFreeMdl Mdl_unk = 0xffffe000473be010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473be010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473be010, MemoryDescriptorList_unk_out = 0xffffe000473be010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002d659a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d659a40, MemoryDescriptorList_unk = 0xffffe000473be010
IoFreeMdl Mdl_unk = 0xffffe000473be010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002e428a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e428a40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473be010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473be010, MemoryDescriptorList_unk_out = 0xffffe000473be010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002e481a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e481a40, MemoryDescriptorList_unk = 0xffffe000473be010
IoFreeMdl Mdl_unk = 0xffffe000473be010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473be010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473be010, MemoryDescriptorList_unk_out = 0xffffe000473be010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002e512a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e512a40, MemoryDescriptorList_unk = 0xffffe000473be010
IoFreeMdl Mdl_unk = 0xffffe000473be010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b724260
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b724260, MemoryDescriptorList_unk_out = 0xffffe0003b724260
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b724260, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002e893a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e893a40, MemoryDescriptorList_unk = 0xffffe0003b724260
IoFreeMdl Mdl_unk = 0xffffe0003b724260
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b724260
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b724260, MemoryDescriptorList_unk_out = 0xffffe0003b724260
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b724260, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002f278a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f278a40, MemoryDescriptorList_unk = 0xffffe0003b724260
IoFreeMdl Mdl_unk = 0xffffe0003b724260
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b724260
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b724260, MemoryDescriptorList_unk_out = 0xffffe0003b724260
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b724260, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002f50ea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f50ea40, MemoryDescriptorList_unk = 0xffffe0003b724260
IoFreeMdl Mdl_unk = 0xffffe0003b724260
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002f5b3a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f5b3a40, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002f6ada40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f6ada40, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00033974a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00033974a40, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00033e3fa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00033e3fa40, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00045bdca40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00045bdca40, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0004a6f7a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0004a6f7a40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae91d10
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae91d10, MemoryDescriptorList_unk_out = 0xffffe0003ae91d10
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae91d10, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0004a7fda40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0004a7fda40, MemoryDescriptorList_unk = 0xffffe0003ae91d10
IoFreeMdl Mdl_unk = 0xffffe0003ae91d10
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd000292a1a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd000292a1a40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029628a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029628a40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029629a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029629a40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002962ca40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002964ea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002964ea40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029676a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029676a40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae91d10
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae91d10, MemoryDescriptorList_unk_out = 0xffffe0003ae91d10
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae91d10, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002987ca40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002987ca40, MemoryDescriptorList_unk = 0xffffe0003ae91d10
IoFreeMdl Mdl_unk = 0xffffe0003ae91d10
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae91d10
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae91d10, MemoryDescriptorList_unk_out = 0xffffe0003ae91d10
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae91d10, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029897a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029897a40, MemoryDescriptorList_unk = 0xffffe0003ae91d10
IoFreeMdl Mdl_unk = 0xffffe0003ae91d10
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bc64010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bc64010, MemoryDescriptorList_unk_out = 0xffffe0003bc64010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bc64010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029aa1a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029aa1a40, MemoryDescriptorList_unk = 0xffffe0003bc64010
IoFreeMdl Mdl_unk = 0xffffe0003bc64010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae679b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae679b0, MemoryDescriptorList_unk_out = 0xffffe0003ae679b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae679b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029aa8a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029aa8a40, MemoryDescriptorList_unk = 0xffffe0003ae679b0
IoFreeMdl Mdl_unk = 0xffffe0003ae679b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473ff4f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473ff4f0, MemoryDescriptorList_unk_out = 0xffffe000473ff4f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473ff4f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029aafa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029aafa40, MemoryDescriptorList_unk = 0xffffe000473ff4f0
IoFreeMdl Mdl_unk = 0xffffe000473ff4f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461f8db0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461f8db0, MemoryDescriptorList_unk_out = 0xffffe000461f8db0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000461f8db0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029dcea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029dcea40, MemoryDescriptorList_unk = 0xffffe000461f8db0
IoFreeMdl Mdl_unk = 0xffffe000461f8db0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029de8a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029de8a40, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a061a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a061a40, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a07aa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a07aa40, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a0a0a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a0a0a40, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a0a2a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a0a2a40, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a0c3a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a0c3a40, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a26fa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a26fa40, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a275a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a275a40, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a283a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a283a40, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8750
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8750, MemoryDescriptorList_unk_out = 0xffffe0003c1f8750
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8750, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a2dca40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a2dca40, MemoryDescriptorList_unk = 0xffffe0003c1f8750
IoFreeMdl Mdl_unk = 0xffffe0003c1f8750
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a796a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a796a40, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c42ba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c42ba40, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c4f1a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c4f1a40, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c65ea40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c65ea40, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c999a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c999a40, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002cd74a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002cd74a40, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002cf66a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002cf66a40, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002e56ba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e56ba40, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00032efba40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00032efba40, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00049a6da40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00049a6da40, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0004a71da40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0004a71da40, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd000291c8a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd000291c8a40, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd000294cca40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd000294cca40, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029836a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029836a40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a43aa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a43aa40, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a787a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a787a40, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b92aa40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b92aa40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c80da40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c80da40, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002cecda40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002cecda40, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2caa40, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c4fb1f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c4fb1f0, MemoryDescriptorList_unk_out = 0xffffe0003c4fb1f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c4fb1f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002d7a0a40
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d7a0a40, MemoryDescriptorList_unk = 0xffffe0003c4fb1f0
IoFreeMdl Mdl_unk = 0xffffe0003c4fb1f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002a40f4d8, Interval = -10000000
Code Block #4 (EP #3, #17, #60)
»
Information Value
Trigger PspCallProcessNotifyRoutines+0x198
Start Address 0xfffff800fc2caa50
Execution Path #3 (length: 64, count: 21, processes: 18)
»
Information Value
Sequence Length 64
Processes
»
Process Count
Process 106 (sc.exe, PID: 3920) 1
Process 14 (svchost.exe, PID: 1296) 1
Process 20 (svchost.exe, PID: 3092) 1
Process 4 (svchost.exe, PID: 628) 4
Process 110 (dllhost.exe, PID: 2832) 1
Process 108 (UNKNOWN, PID: UNKNOWN) 1
Process 41 (backgroundtaskhost.exe, PID: 1124) 1
Process 44 (hxtsr.exe, PID: 3844) 1
Process 113 (backgroundtaskhost.exe, PID: 3936) 1
Process 112 (backgroundtaskhost.exe, PID: 3212) 1
Process 7 (svchost.exe, PID: 888) 1
Process 25 (winlogon.exe, PID: 508) 1
Process 115 (cmd.exe, PID: 1224) 1
Process 114 (mpcmdrun.exe, PID: 4164) 1
Process 116 (UNKNOWN, PID: UNKNOWN) 1
Process 37 (taskhostw.exe, PID: 3804) 1
Process 111 (dllhost.exe, PID: 4116) 1
Process 18 (sppsvc.exe, PID: 3908) 1
Sequence
»
Symbol Parameters
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x500, Tag = 0x776f6f, ret_val_ptr_out = 0xffffe0003c6342f0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x500, Tag = 0x776f6f, ret_val_ptr_out = 0xffffe0003a763010
PsLookupProcessByProcessId ProcessId_unk = 0xf50, Process_unk_out = 0xffffd00032fe7f08, ret_val_out = 0x0
PsGetProcessInheritedFromUniqueProcessId ret_val_out = 0x3e8
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00032fe7cc0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00032fe7cb0, ClientId_deref_UniqueProcess_unk = 0xf50, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00032fe7d08, ProcessHandle_out = 0xffffffff80001064, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001064, ProcessInformationClass_unk = 0x1a, ProcessInformationLength = 0x8, ProcessInformation_ptr_out = 0xffffd00032fe7d10, ReturnLength_ptr_out = 0xffffd00032fe7d00, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80001064, ret_val_out = 0x0
RtlInitUnicodeString SourceString = PsGetProcessPeb, DestinationString_out = PsGetProcessPeb
MmGetSystemRoutineAddress SystemRoutineName = PsGetProcessPeb, ret_val_ptr_out = 0xfffff8004175a98c
PsGetProcessPeb ret_val_out = 0x3db000
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00032fe7c50, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00032fe7c40, ClientId_deref_UniqueProcess_unk = 0xf50, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00032fe7cb0, ProcessHandle_out = 0x4c, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x4c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00032fe7ca0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634270
ZwQueryInformationProcess ProcessHandle_unk = 0x4c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x70, ProcessInformation_ptr_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00032fe7ca0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = sc.exe, DestinationString_out = sc.exe
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634250
RtlCopyUnicodeString SourceString = sc.exe, DestinationString_out = sc.exe
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
ZwClose Handle_unk = 0x4c, ret_val_out = 0x0
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00032fe7c50, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00032fe7c40, ClientId_deref_UniqueProcess_unk = 0x3e8, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00032fe7cb0, ProcessHandle_out = 0x4c, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x4c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00032fe7ca0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0x4c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd00032fe7ca0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = svchost.exe, DestinationString_out = svchost.exe
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x18, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634190
RtlCopyUnicodeString SourceString = svchost.exe, DestinationString_out = svchost.exe
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ZwClose Handle_unk = 0x4c, ret_val_out = 0x0
_wcsicmp _String1 = svchost.exe, _String2 = explorer.exe, ret_val_out = 14
_wcsicmp _String1 = svchost.exe, _String2 = 360Tray.exe, ret_val_out = 64
_wcsicmp _String1 = svchost.exe, _String2 = 360DesktopLite.exe, ret_val_out = 64
_wcsicmp _String1 = svchost.exe, _String2 = SoftMgrLite.exe, ret_val_out = 7
_wcsicmp _String1 = svchost.exe, _String2 = DCBrowserLauncher.exe, ret_val_out = 15
_wcsicmp _String1 = svchost.exe, _String2 = ChromeCoreLauncher.exe, ret_val_out = 16
_wcsicmp _String1 = svchost.exe, _String2 = WmiPrvSE.exe, ret_val_out = -4
RtlFreeAnsiString AnsiString = s
RtlFreeAnsiString AnsiString = s
ExFreePoolWithTag P_ptr = 0xffffe0003c6342f0, Tag = 0x776f6f
ExFreePoolWithTag P_ptr = 0xffffe0003a763010, Tag = 0x776f6f
ObfReferenceObject Object_ptr = 0xffffe0003ba59080, ret_val_ptr_out = 0x27ff7
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00032fe7c70, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00032fe7c60, ClientId_deref_UniqueProcess_unk = 0xf50, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00032fe7cd0, ProcessHandle_out = 0x4c, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x4c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00032fe7cc0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634270
ZwQueryInformationProcess ProcessHandle_unk = 0x4c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x70, ProcessInformation_ptr_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00032fe7cc0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = sc.exe, DestinationString_out = sc.exe
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634250
RtlCopyUnicodeString SourceString = sc.exe, DestinationString_out = sc.exe
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
ZwClose Handle_unk = 0x4c, ret_val_out = 0x0
_wcsicmp _String1 = sc.exe, _String2 = msedge.exe, ret_val_out = 6
_wcsicmp _String1 = sc.exe, _String2 = iexplore.exe, ret_val_out = 10
_wcsicmp _String1 = sc.exe, _String2 = 360se.exe, ret_val_out = 64
_wcsicmp _String1 = sc.exe, _String2 = 2345Explorer.exe, ret_val_out = 65
_wcsicmp _String1 = sc.exe, _String2 = QQBrowser.exe, ret_val_out = 2
_wcsicmp _String1 = sc.exe, _String2 = chrome.exe, ret_val_out = 16
_wcsicmp _String1 = sc.exe, _String2 = 360chrome.exe, ret_val_out = 64
_wcsicmp _String1 = sc.exe, _String2 = SogouExplorer.exe, ret_val_out = -12
_wcsicmp _String1 = sc.exe, _String2 = Maxthon.exe, ret_val_out = 6
_wcsicmp _String1 = sc.exe, _String2 = TheWorld.exe, ret_val_out = -1
_wcsicmp _String1 = sc.exe, _String2 = firefox.exe, ret_val_out = 13
_wcsicmp _String1 = sc.exe, _String2 = DCBrowser.exe, ret_val_out = 15
_wcsicmp _String1 = sc.exe, _String2 = ChromeCore.exe, ret_val_out = 16
_wcsicmp _String1 = sc.exe, _String2 = liebao.exe, ret_val_out = 7
RtlFreeAnsiString AnsiString = s
Execution Path #17 (length: 72, count: 1, processes: 1)
»
Information Value
Sequence Length 72
Processes
»
Process Count
Process 1 (pvdnlz.exe, PID: 2280) 1
Sequence
»
Symbol Parameters
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x500, Tag = 0x776f6f, ret_val_ptr_out = 0xffffe0003a76e5f0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x500, Tag = 0x776f6f, ret_val_ptr_out = 0xffffe0003a76f010
PsLookupProcessByProcessId ProcessId_unk = 0x8e8, Process_unk_out = 0xffffd00029ec4f08, ret_val_out = 0x0
PsGetProcessInheritedFromUniqueProcessId ret_val_out = 0x4a0
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00029ec4cc0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00029ec4cb0, ClientId_deref_UniqueProcess_unk = 0x8e8, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00029ec4d08, ProcessHandle_out = 0xffffffff80000870, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000870, ProcessInformationClass_unk = 0x1a, ProcessInformationLength = 0x8, ProcessInformation_ptr_out = 0xffffd00029ec4d10, ReturnLength_ptr_out = 0xffffd00029ec4d00, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000870, ret_val_out = 0x0
RtlInitUnicodeString SourceString = PsGetProcessPeb, DestinationString_out = PsGetProcessPeb
MmGetSystemRoutineAddress SystemRoutineName = PsGetProcessPeb, ret_val_ptr_out = 0xfffff8004175a98c
PsGetProcessPeb ret_val_out = 0x3f4000
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00029ec4c50, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00029ec4c40, ClientId_deref_UniqueProcess_unk = 0x8e8, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00029ec4cb0, ProcessHandle_out = 0x7c, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x7c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00029ec4ca0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0x7c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x78, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd00029ec4ca0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = pvdNlZ.exe, DestinationString_out = pvdNlZ.exe
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x16, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634190
RtlCopyUnicodeString SourceString = pvdNlZ.exe, DestinationString_out = pvdNlZ.exe
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ZwClose Handle_unk = 0x7c, ret_val_out = 0x0
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00029ec4c50, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00029ec4c40, ClientId_deref_UniqueProcess_unk = 0x4a0, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00029ec4cb0, ProcessHandle_out = 0x7c, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x7c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00029ec4ca0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x6a, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634270
ZwQueryInformationProcess ProcessHandle_unk = 0x7c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x6a, ProcessInformation_ptr_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029ec4ca0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = explorer.exe, DestinationString_out = explorer.exe
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1a, Tag = 0x0, ret_val_ptr_out = 0xffffe0003af95e90
RtlCopyUnicodeString SourceString = explorer.exe, DestinationString_out = explorer.exe
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
ZwClose Handle_unk = 0x7c, ret_val_out = 0x0
_wcsicmp _String1 = explorer.exe, _String2 = explorer.exe, ret_val_out = 0
RtlFreeAnsiString AnsiString = e
_wcsicmp _String1 = pvdNlZ.exe, _String2 = msedge.exe, ret_val_out = 3
_wcsicmp _String1 = pvdNlZ.exe, _String2 = iexplore.exe, ret_val_out = 7
_wcsicmp _String1 = pvdNlZ.exe, _String2 = 360se.exe, ret_val_out = 61
_wcsicmp _String1 = pvdNlZ.exe, _String2 = 2345Explorer.exe, ret_val_out = 62
_wcsicmp _String1 = pvdNlZ.exe, _String2 = QQBrowser.exe, ret_val_out = -1
_wcsicmp _String1 = pvdNlZ.exe, _String2 = chrome.exe, ret_val_out = 13
_wcsicmp _String1 = pvdNlZ.exe, _String2 = 360chrome.exe, ret_val_out = 61
_wcsicmp _String1 = pvdNlZ.exe, _String2 = SogouExplorer.exe, ret_val_out = -3
_wcsicmp _String1 = pvdNlZ.exe, _String2 = Maxthon.exe, ret_val_out = 3
_wcsicmp _String1 = pvdNlZ.exe, _String2 = TheWorld.exe, ret_val_out = -4
_wcsicmp _String1 = pvdNlZ.exe, _String2 = firefox.exe, ret_val_out = 10
_wcsicmp _String1 = pvdNlZ.exe, _String2 = DCBrowser.exe, ret_val_out = 12
_wcsicmp _String1 = pvdNlZ.exe, _String2 = ChromeCore.exe, ret_val_out = 13
_wcsicmp _String1 = pvdNlZ.exe, _String2 = liebao.exe, ret_val_out = 4
RtlFreeAnsiString AnsiString = p
ExFreePoolWithTag P_ptr = 0xffffe0003a76e5f0, Tag = 0x776f6f
ExFreePoolWithTag P_ptr = 0xffffe0003a76f010, Tag = 0x776f6f
ObfReferenceObject Object_ptr = 0xffffe0003b09e080, ret_val_ptr_out = 0x18006
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00029ec4c70, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00029ec4c60, ClientId_deref_UniqueProcess_unk = 0x8e8, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00029ec4cd0, ProcessHandle_out = 0x7c, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x7c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00029ec4cc0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0x7c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x78, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd00029ec4cc0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = pvdNlZ.exe, DestinationString_out = pvdNlZ.exe
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x16, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634190
RtlCopyUnicodeString SourceString = pvdNlZ.exe, DestinationString_out = pvdNlZ.exe
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ZwClose Handle_unk = 0x7c, ret_val_out = 0x0
_wcsicmp _String1 = pvdNlZ.exe, _String2 = msedge.exe, ret_val_out = 3
_wcsicmp _String1 = pvdNlZ.exe, _String2 = iexplore.exe, ret_val_out = 7
_wcsicmp _String1 = pvdNlZ.exe, _String2 = 360se.exe, ret_val_out = 61
_wcsicmp _String1 = pvdNlZ.exe, _String2 = 2345Explorer.exe, ret_val_out = 62
_wcsicmp _String1 = pvdNlZ.exe, _String2 = QQBrowser.exe, ret_val_out = -1
_wcsicmp _String1 = pvdNlZ.exe, _String2 = chrome.exe, ret_val_out = 13
_wcsicmp _String1 = pvdNlZ.exe, _String2 = 360chrome.exe, ret_val_out = 61
_wcsicmp _String1 = pvdNlZ.exe, _String2 = SogouExplorer.exe, ret_val_out = -3
_wcsicmp _String1 = pvdNlZ.exe, _String2 = Maxthon.exe, ret_val_out = 3
_wcsicmp _String1 = pvdNlZ.exe, _String2 = TheWorld.exe, ret_val_out = -4
_wcsicmp _String1 = pvdNlZ.exe, _String2 = firefox.exe, ret_val_out = 10
_wcsicmp _String1 = pvdNlZ.exe, _String2 = DCBrowser.exe, ret_val_out = 12
_wcsicmp _String1 = pvdNlZ.exe, _String2 = ChromeCore.exe, ret_val_out = 13
_wcsicmp _String1 = pvdNlZ.exe, _String2 = liebao.exe, ret_val_out = 4
RtlFreeAnsiString AnsiString = p
Execution Path #60 (length: 63, count: 1, processes: 1)
»
Information Value
Sequence Length 63
Processes
»
Process Count
Process 114 (mpcmdrun.exe, PID: 4164) 1
Sequence
»
Symbol Parameters
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x500, Tag = 0x776f6f, ret_val_ptr_out = 0xffffe0003a7a4b00
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x500, Tag = 0x776f6f, ret_val_ptr_out = 0xffffe0003a7a45f0
PsLookupProcessByProcessId ProcessId_unk = 0x5ac, Process_unk_out = 0xffffd0002e87ce58, ret_val_out = 0x0
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd0002e87cc10, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd0002e87cc00, ClientId_deref_UniqueProcess_unk = 0x5ac, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd0002e87cc58, ProcessHandle_out = 0xffffffff80000d68, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000d68, ProcessInformationClass_unk = 0x1a, ProcessInformationLength = 0x8, ProcessInformation_ptr_out = 0xffffd0002e87cc60, ReturnLength_ptr_out = 0xffffd0002e87cc50, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000d68, ret_val_out = 0x0
RtlInitUnicodeString SourceString = PsGetProcessPeb, DestinationString_out = PsGetProcessPeb
MmGetSystemRoutineAddress SystemRoutineName = PsGetProcessPeb, ret_val_ptr_out = 0xfffff8004175a98c
PsGetProcessPeb ret_val_out = 0x319000
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd0002e87cba0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd0002e87cb90, ClientId_deref_UniqueProcess_unk = 0x5ac, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd0002e87cc00, ProcessHandle_out = 0x20, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x20, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002e87cbf0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0x20, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002e87cbf0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = conhost.exe, DestinationString_out = conhost.exe
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x18, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634190
RtlCopyUnicodeString SourceString = conhost.exe, DestinationString_out = conhost.exe
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ZwClose Handle_unk = 0x20, ret_val_out = 0x0
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd0002e87cba0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd0002e87cb90, ClientId_deref_UniqueProcess_unk = 0x1044, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd0002e87cc00, ProcessHandle_out = 0x20, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x20, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002e87cbf0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x98, Tag = 0x0, ret_val_ptr_out = 0xffffe0003af83ef0
ZwQueryInformationProcess ProcessHandle_unk = 0x20, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x98, ProcessInformation_ptr_out = 0xffffe0003af83ef0, ReturnLength_ptr_out = 0xffffd0002e87cbf0, ret_val_out = 0x0
RtlInitUnicodeString SourceString = MpCmdRun.exe, DestinationString_out = MpCmdRun.exe
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1a, Tag = 0x0, ret_val_ptr_out = 0xffffe0003af95e90
RtlCopyUnicodeString SourceString = MpCmdRun.exe, DestinationString_out = MpCmdRun.exe
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
ZwClose Handle_unk = 0x20, ret_val_out = 0x0
_wcsicmp _String1 = MpCmdRun.exe, _String2 = explorer.exe, ret_val_out = 8
_wcsicmp _String1 = MpCmdRun.exe, _String2 = 360Tray.exe, ret_val_out = 58
_wcsicmp _String1 = MpCmdRun.exe, _String2 = 360DesktopLite.exe, ret_val_out = 58
_wcsicmp _String1 = MpCmdRun.exe, _String2 = SoftMgrLite.exe, ret_val_out = -6
_wcsicmp _String1 = MpCmdRun.exe, _String2 = DCBrowserLauncher.exe, ret_val_out = 9
_wcsicmp _String1 = MpCmdRun.exe, _String2 = ChromeCoreLauncher.exe, ret_val_out = 10
_wcsicmp _String1 = MpCmdRun.exe, _String2 = WmiPrvSE.exe, ret_val_out = -10
RtlFreeAnsiString AnsiString = M
RtlFreeAnsiString AnsiString = c
ExFreePoolWithTag P_ptr = 0xffffe0003a7a4b00, Tag = 0x776f6f
ExFreePoolWithTag P_ptr = 0xffffe0003a7a45f0, Tag = 0x776f6f
ObfReferenceObject Object_ptr = 0xffffe0003b09a080, ret_val_ptr_out = 0x8001
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd0002e87cbc0, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd0002e87cbb0, ClientId_deref_UniqueProcess_unk = 0x5ac, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd0002e87cc20, ProcessHandle_out = 0x20, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x20, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002e87cc10, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0x20, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002e87cc10, ret_val_out = 0x0
RtlInitUnicodeString SourceString = conhost.exe, DestinationString_out = conhost.exe
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x18, Tag = 0x0, ret_val_ptr_out = 0xffffe0003c634190
RtlCopyUnicodeString SourceString = conhost.exe, DestinationString_out = conhost.exe
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ZwClose Handle_unk = 0x20, ret_val_out = 0x0
_wcsicmp _String1 = conhost.exe, _String2 = msedge.exe, ret_val_out = -10
_wcsicmp _String1 = conhost.exe, _String2 = iexplore.exe, ret_val_out = -6
_wcsicmp _String1 = conhost.exe, _String2 = 360se.exe, ret_val_out = 48
_wcsicmp _String1 = conhost.exe, _String2 = 2345Explorer.exe, ret_val_out = 49
_wcsicmp _String1 = conhost.exe, _String2 = QQBrowser.exe, ret_val_out = -14
_wcsicmp _String1 = conhost.exe, _String2 = chrome.exe, ret_val_out = 7
_wcsicmp _String1 = conhost.exe, _String2 = 360chrome.exe, ret_val_out = 48
_wcsicmp _String1 = conhost.exe, _String2 = SogouExplorer.exe, ret_val_out = -16
_wcsicmp _String1 = conhost.exe, _String2 = Maxthon.exe, ret_val_out = -10
_wcsicmp _String1 = conhost.exe, _String2 = TheWorld.exe, ret_val_out = -17
_wcsicmp _String1 = conhost.exe, _String2 = firefox.exe, ret_val_out = -3
_wcsicmp _String1 = conhost.exe, _String2 = DCBrowser.exe, ret_val_out = -1
_wcsicmp _String1 = conhost.exe, _String2 = ChromeCore.exe, ret_val_out = 7
_wcsicmp _String1 = conhost.exe, _String2 = liebao.exe, ret_val_out = -9
RtlFreeAnsiString AnsiString = c
Code Block #17 (EP #15, #18)
»
Information Value
Trigger PspCallProcessNotifyRoutines+0x198
Start Address 0xfffff800fc2caa40
Execution Path #15 (length: 5, count: 15, processes: 15)
»
Information Value
Sequence Length 5
Processes
»
Process Count
Process 14 (svchost.exe, PID: 1296) 1
Process 20 (svchost.exe, PID: 3092) 1
Process 1 (pvdnlz.exe, PID: 2280) 1
Process 110 (dllhost.exe, PID: 2832) 1
Process 108 (UNKNOWN, PID: UNKNOWN) 1
Process 41 (backgroundtaskhost.exe, PID: 1124) 1
Process 44 (hxtsr.exe, PID: 3844) 1
Process 113 (backgroundtaskhost.exe, PID: 3936) 1
Process 112 (backgroundtaskhost.exe, PID: 3212) 1
Process 115 (cmd.exe, PID: 1224) 1
Process 114 (mpcmdrun.exe, PID: 4164) 1
Process 116 (UNKNOWN, PID: UNKNOWN) 1
Process 37 (taskhostw.exe, PID: 3804) 1
Process 111 (dllhost.exe, PID: 4116) 1
Process 18 (sppsvc.exe, PID: 3908) 1
Sequence
»
Symbol Parameters
PsLookupProcessByProcessId ProcessId_unk = 0x510, Process_unk_out = 0xffffd0002f2c7138, ret_val_out = 0x0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bebe4d0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc, ret_val_ptr_out = 0xffffe0003c634250
RtlUpperString DestinationString = svchost.exe, SourceString = svchost.exe, DestinationString_out = SVCHOST.EXE
RtlFreeAnsiString AnsiString = SVCHOST.EXE
Execution Path #18 (length: 89, count: 7, processes: 4)
»
Information Value
Sequence Length 89
Processes
»
Process Count
Process 4 (svchost.exe, PID: 628) 4
Process 25 (winlogon.exe, PID: 508) 1
Process 7 (svchost.exe, PID: 888) 1
Process 114 (mpcmdrun.exe, PID: 4164) 1
Sequence
»
Symbol Parameters
PsLookupProcessByProcessId ProcessId_unk = 0x1014, Process_unk_out = 0xffffd0002a34e638, ret_val_out = 0x0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bfe04d0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc, ret_val_ptr_out = 0xffffe0003c634250
RtlUpperString DestinationString = dllhost.exe, SourceString = dllhost.exe, DestinationString_out = DLLHOST.EXE
strstr _Str = DLLHOST.EXE, _SubStr = 360TRAY
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = SuperKiller, SourceString = SuperKiller, DestinationString_out = SUPERKILLER
strstr _Str = DLLHOST.EXE, _SubStr = SUPERKILLER
RtlFreeAnsiString AnsiString = SUPERKILLER
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = SuperKillller, SourceString = SuperKillller, DestinationString_out = SUPERKILLLLER
strstr _Str = DLLHOST.EXE, _SubStr = SUPERKILLLLER
RtlFreeAnsiString AnsiString = SUPERKILLLLER
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = 360EvtMgr, SourceString = 360EvtMgr, DestinationString_out = 360EVTMGR
strstr _Str = DLLHOST.EXE, _SubStr = 360EVTMGR
RtlFreeAnsiString AnsiString = 360EVTMGR
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = SystemAidBox, SourceString = SystemAidBox, DestinationString_out = SYSTEMAIDBOX
strstr _Str = DLLHOST.EXE, _SubStr = SYSTEMAIDBOX
RtlFreeAnsiString AnsiString = SYSTEMAIDBOX
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = HRSword, SourceString = HRSword, DestinationString_out = HRSWORD
strstr _Str = DLLHOST.EXE, _SubStr = HRSWORD
RtlFreeAnsiString AnsiString = HRSWORD
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = hrkill, SourceString = hrkill, DestinationString_out = HRKILL
strstr _Str = DLLHOST.EXE, _SubStr = HRKILL
RtlFreeAnsiString AnsiString = HRKILL
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xb, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = sysfixkill, SourceString = sysfixkill, DestinationString_out = SYSFIXKILL
strstr _Str = DLLHOST.EXE, _SubStr = SYSFIXKILL
RtlFreeAnsiString AnsiString = SYSFIXKILL
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd0002a34e510, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd0002a34e4f0, ClientId_deref_UniqueProcess_unk = 0x1014, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd0002a34e4d0, ProcessHandle_out = 0xbc0, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xbc0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002a34e568, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xbc0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002a34e568, ret_val_out = 0x0
ZwOpenFile DesiredAccess_unk = 0x80000000, ObjectAttributes_ptr = 0xffffd0002a34e510, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Device\HarddiskVolume1\Windows\System32\dllhost.exe, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ShareAccess = 0x3, OpenOptions = 0x0, FileHandle_ptr_out = 0xffffd0002a34e4d8, FileHandle_out = 0xffffffff80000bf4, IoStatusBlock_unk_out = 0xffffd0002a34e500, ret_val_out = 0x0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000bf4, DesiredAccess_unk = 0x10000000, ObjectType_unk = 0xffffe0003a468dc0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd0002a34e578, Object_out = 0xffffe0003b67df20, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
IoVolumeDeviceToDosName VolumeDeviceObject_ptr = 0xffffe0003b695780, DosName_out = C:, ret_val_out = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x86, ret_val_ptr_out = 0xffffe0003af95ec0
RtlAppendUnicodeStringToString Destination = \??\, Source = C:, Destination_out = \??\C:, ret_val_out = 0x0
RtlAppendUnicodeStringToString Destination = \??\C:, Source = \Windows\System32\dllhost.exe, Destination_out = \??\C:\Windows\System32\dllhost.exe, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003b67df20, ret_val_ptr_out = 0x8000
ZwClose Handle_unk = 0xffffffff80000bf4, ret_val_out = 0x0
ZwClose Handle_unk = 0xbc0, ret_val_out = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8e, ret_val_ptr_out = 0xffffe0003a763d70
RtlInitUnicodeString SourceString = \??\C:\Windows\System32\Fix, DestinationString_out = \??\C:\Windows\System32\Fix
ZwCreateFile DesiredAccess_unk = 0x100001, ObjectAttributes_ptr = 0xffffd0002a34e100, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \??\C:\Windows\System32\Fix, ObjectAttributes_deref_Attributes = 0x40, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x3, CreateDisposition = 0x1, CreateOptions = 0x40, EaBuffer_ptr = 0x0, EaLength = 0x0, FileHandle_ptr_out = 0xffffd0002a34e560, FileHandle_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002a34e130, ret_val_out = 0xc0000034
ExFreePoolWithTag P_ptr = 0xffffe0003a763d70, Tag = 0x0
RtlFreeAnsiString AnsiString = \
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = pchunter, SourceString = pchunter, DestinationString_out = PCHUNTER
strstr _Str = DLLHOST.EXE, _SubStr = PCHUNTER
RtlFreeAnsiString AnsiString = PCHUNTER
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = procexp, SourceString = procexp, DestinationString_out = PROCEXP
strstr _Str = DLLHOST.EXE, _SubStr = PROCEXP
RtlFreeAnsiString AnsiString = PROCEXP
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = powertool, SourceString = powertool, DestinationString_out = POWERTOOL
strstr _Str = DLLHOST.EXE, _SubStr = POWERTOOL
RtlFreeAnsiString AnsiString = POWERTOOL
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = process monitor, SourceString = process monitor, DestinationString_out = PROCESS MONITOR
strstr _Str = DLLHOST.EXE, _SubStr = PROCESS MONITOR
RtlFreeAnsiString AnsiString = PROCESS MONITOR
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = Dbgview, SourceString = Dbgview, DestinationString_out = DBGVIEW
strstr _Str = DLLHOST.EXE, _SubStr = DBGVIEW
RtlFreeAnsiString AnsiString = DBGVIEW
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = superkiller, SourceString = superkiller, DestinationString_out = SUPERKILLER
strstr _Str = DLLHOST.EXE, _SubStr = SUPERKILLER
RtlFreeAnsiString AnsiString = SUPERKILLER
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = superkillller, SourceString = superkillller, DestinationString_out = SUPERKILLLLER
strstr _Str = DLLHOST.EXE, _SubStr = SUPERKILLLLER
RtlFreeAnsiString AnsiString = SUPERKILLLLER
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = systemaidbox, SourceString = systemaidbox, DestinationString_out = SYSTEMAIDBOX
strstr _Str = DLLHOST.EXE, _SubStr = SYSTEMAIDBOX
RtlFreeAnsiString AnsiString = SYSTEMAIDBOX
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7, ret_val_ptr_out = 0xffffe0003a7664b0
RtlUpperString DestinationString = hrkill, SourceString = hrkill, DestinationString_out = HRKILL
strstr _Str = DLLHOST.EXE, _SubStr = HRKILL
RtlFreeAnsiString AnsiString = HRKILL
RtlFreeAnsiString AnsiString = DLLHOST.EXE
Code Block #18 (EP #178)
»
Information Value
Trigger PspSystemThreadStartup+0x3f
Start Address 0xfffff800fc2cbbc0
Execution Path #178 (length: 832, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 832
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044807f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044807f40, MemoryDescriptorList_unk_out = 0xffffe00044807f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044807f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00045a2e560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00045a2e560, MemoryDescriptorList_unk = 0xffffe00044807f40
IoFreeMdl Mdl_unk = 0xffffe00044807f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b494460
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b494460, MemoryDescriptorList_unk_out = 0xffffe0003b494460
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b494460, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00049a54560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00049a54560, MemoryDescriptorList_unk = 0xffffe0003b494460
IoFreeMdl Mdl_unk = 0xffffe0003b494460
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c067610
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c067610, MemoryDescriptorList_unk_out = 0xffffe0003c067610
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c067610, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00028d38560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00028d38560, MemoryDescriptorList_unk = 0xffffe0003c067610
IoFreeMdl Mdl_unk = 0xffffe0003c067610
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c067610
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c067610, MemoryDescriptorList_unk_out = 0xffffe0003c067610
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c067610, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b154560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b154560, MemoryDescriptorList_unk = 0xffffe0003c067610
IoFreeMdl Mdl_unk = 0xffffe0003c067610
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b096970
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b096970, MemoryDescriptorList_unk_out = 0xffffe0003b096970
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b096970, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b594560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b594560, MemoryDescriptorList_unk = 0xffffe0003b096970
IoFreeMdl Mdl_unk = 0xffffe0003b096970
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b096970
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b096970, MemoryDescriptorList_unk_out = 0xffffe0003b096970
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b096970, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002bbc7560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bbc7560, MemoryDescriptorList_unk = 0xffffe0003b096970
IoFreeMdl Mdl_unk = 0xffffe0003b096970
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1303b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1303b0, MemoryDescriptorList_unk_out = 0xffffe0003c1303b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1303b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002be80560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002be80560, MemoryDescriptorList_unk = 0xffffe0003c1303b0
IoFreeMdl Mdl_unk = 0xffffe0003c1303b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b096970
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b096970, MemoryDescriptorList_unk_out = 0xffffe0003b096970
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b096970, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002bfd2560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bfd2560, MemoryDescriptorList_unk = 0xffffe0003b096970
IoFreeMdl Mdl_unk = 0xffffe0003b096970
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcb2440
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcb2440, MemoryDescriptorList_unk_out = 0xffffe0003bcb2440
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c8e6560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c8e6560, MemoryDescriptorList_unk = 0xffffe0003bcb2440
IoFreeMdl Mdl_unk = 0xffffe0003bcb2440
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c067610
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c067610, MemoryDescriptorList_unk_out = 0xffffe0003c067610
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c067610, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002d1c9560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d1c9560, MemoryDescriptorList_unk = 0xffffe0003c067610
IoFreeMdl Mdl_unk = 0xffffe0003c067610
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c067610
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c067610, MemoryDescriptorList_unk_out = 0xffffe0003c067610
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c067610, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002e593560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e593560, MemoryDescriptorList_unk = 0xffffe0003c067610
IoFreeMdl Mdl_unk = 0xffffe0003c067610
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473fc010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473fc010, MemoryDescriptorList_unk_out = 0xffffe000473fc010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473fc010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002ef2c560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ef2c560, MemoryDescriptorList_unk = 0xffffe000473fc010
IoFreeMdl Mdl_unk = 0xffffe000473fc010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461ff680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461ff680, MemoryDescriptorList_unk_out = 0xffffe000461ff680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000461ff680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002f93d560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f93d560, MemoryDescriptorList_unk = 0xffffe000461ff680
IoFreeMdl Mdl_unk = 0xffffe000461ff680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b0eebf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b0eebf0, MemoryDescriptorList_unk_out = 0xffffe0003b0eebf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b0eebf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00045ab6560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00045ab6560, MemoryDescriptorList_unk = 0xffffe0003b0eebf0
IoFreeMdl Mdl_unk = 0xffffe0003b0eebf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461ff680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461ff680, MemoryDescriptorList_unk_out = 0xffffe000461ff680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000461ff680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00049aed560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00049aed560, MemoryDescriptorList_unk = 0xffffe000461ff680
IoFreeMdl Mdl_unk = 0xffffe000461ff680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9bd520
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9bd520, MemoryDescriptorList_unk_out = 0xffffe0003b9bd520
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9bd520, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00028a34560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00028a34560, MemoryDescriptorList_unk = 0xffffe0003b9bd520
IoFreeMdl Mdl_unk = 0xffffe0003b9bd520
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c251f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c251f40, MemoryDescriptorList_unk_out = 0xffffe0003c251f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c251f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029426560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029426560, MemoryDescriptorList_unk = 0xffffe0003c251f40
IoFreeMdl Mdl_unk = 0xffffe0003c251f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c0f9c50
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c0f9c50, MemoryDescriptorList_unk_out = 0xffffe0003c0f9c50
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c0f9c50, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029a19560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029a19560, MemoryDescriptorList_unk = 0xffffe0003c0f9c50
IoFreeMdl Mdl_unk = 0xffffe0003c0f9c50
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c0f9c50
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c0f9c50, MemoryDescriptorList_unk_out = 0xffffe0003c0f9c50
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c0f9c50, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029a25560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029a25560, MemoryDescriptorList_unk = 0xffffe0003c0f9c50
IoFreeMdl Mdl_unk = 0xffffe0003c0f9c50
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029a2e560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029a2e560, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029c18560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029c18560, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029e13560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029e13560, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a0f2560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a0f2560, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a0fa560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a0fa560, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a101560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a101560, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a10c560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a10c560, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a113560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a113560, MemoryDescriptorList_unk = 0xffffe00040932cf0
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcb2440
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcb2440, MemoryDescriptorList_unk_out = 0xffffe0003bcb2440
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a187560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a187560, MemoryDescriptorList_unk = 0xffffe0003bcb2440
IoFreeMdl Mdl_unk = 0xffffe0003bcb2440
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcb2440
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcb2440, MemoryDescriptorList_unk_out = 0xffffe0003bcb2440
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a4d5560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a4d5560, MemoryDescriptorList_unk = 0xffffe0003bcb2440
IoFreeMdl Mdl_unk = 0xffffe0003bcb2440
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c306640, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a4fc560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a4fc560, MemoryDescriptorList_unk = 0xffffe0003c306640
IoFreeMdl Mdl_unk = 0xffffe0003c306640
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c306640, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a65b560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a65b560, MemoryDescriptorList_unk = 0xffffe0003c306640
IoFreeMdl Mdl_unk = 0xffffe0003c306640
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1fc4c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1fc4c0, MemoryDescriptorList_unk_out = 0xffffe0003c1fc4c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1fc4c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a675560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a675560, MemoryDescriptorList_unk = 0xffffe0003c1fc4c0
IoFreeMdl Mdl_unk = 0xffffe0003c1fc4c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd56930
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd56930, MemoryDescriptorList_unk_out = 0xffffe0003bd56930
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd56930, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a697560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a697560, MemoryDescriptorList_unk = 0xffffe0003bd56930
IoFreeMdl Mdl_unk = 0xffffe0003bd56930
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a893560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a893560, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a89a560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a89a560, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a8b1560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a8b1560, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a8ce560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a8ce560, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a8d2560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a8d2560, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002ab0f560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ab0f560, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002ab12560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ab12560, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002ab14560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ab14560, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002ab4a560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ab4a560, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002adb4560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002adb4560, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002ae3b560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ae3b560, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002ae5c560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ae5c560, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003a4ae280
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003a4ae280, MemoryDescriptorList_unk_out = 0xffffe0003a4ae280
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003a4ae280, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002af4d560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002af4d560, MemoryDescriptorList_unk = 0xffffe0003a4ae280
IoFreeMdl Mdl_unk = 0xffffe0003a4ae280
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003a4ae280
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003a4ae280, MemoryDescriptorList_unk_out = 0xffffe0003a4ae280
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003a4ae280, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002af52560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002af52560, MemoryDescriptorList_unk = 0xffffe0003a4ae280
IoFreeMdl Mdl_unk = 0xffffe0003a4ae280
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002af62560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002af62560, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000487ed580, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b0c6560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b0c6560, MemoryDescriptorList_unk = 0xffffe000487ed580
IoFreeMdl Mdl_unk = 0xffffe000487ed580
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003a4ae280
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003a4ae280, MemoryDescriptorList_unk_out = 0xffffe0003a4ae280
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003a4ae280, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b0ea560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b0ea560, MemoryDescriptorList_unk = 0xffffe0003a4ae280
IoFreeMdl Mdl_unk = 0xffffe0003a4ae280
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b1d6560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b1d6560, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b1d8560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b1d8560, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b1dd560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b1dd560, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b1ed560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b1ed560, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b5ad560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b5ad560, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bd5e400
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b5bc560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b5bc560, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bd5e400, MemoryDescriptorList_unk_out = 0xffffe0003bd5e400
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd5e400, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b5bf560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b5bf560, MemoryDescriptorList_unk = 0xffffe0003bd5e400
IoFreeMdl Mdl_unk = 0xffffe0003bd5e400
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b698560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b698560, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b69c560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b69c560, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b8a4560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b8a4560, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b8ad560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b8ad560, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1a2170
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1a2170, MemoryDescriptorList_unk_out = 0xffffe0003c1a2170
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1a2170, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b8b0560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b8b0560, MemoryDescriptorList_unk = 0xffffe0003c1a2170
IoFreeMdl Mdl_unk = 0xffffe0003c1a2170
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1fc4c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1fc4c0, MemoryDescriptorList_unk_out = 0xffffe0003c1fc4c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1fc4c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b8c8560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b8c8560, MemoryDescriptorList_unk = 0xffffe0003c1fc4c0
IoFreeMdl Mdl_unk = 0xffffe0003c1fc4c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9bd520
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9bd520, MemoryDescriptorList_unk_out = 0xffffe0003b9bd520
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9bd520, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002ba33560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ba33560, MemoryDescriptorList_unk = 0xffffe0003b9bd520
IoFreeMdl Mdl_unk = 0xffffe0003b9bd520
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b491560
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b491560, MemoryDescriptorList_unk_out = 0xffffe0003b491560
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b491560, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002be49560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002be49560, MemoryDescriptorList_unk = 0xffffe0003b491560
IoFreeMdl Mdl_unk = 0xffffe0003b491560
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003f9b4870
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003f9b4870, MemoryDescriptorList_unk_out = 0xffffe0003f9b4870
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003f9b4870, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002be54560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002be54560, MemoryDescriptorList_unk = 0xffffe0003f9b4870
IoFreeMdl Mdl_unk = 0xffffe0003f9b4870
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcd4b60
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcd4b60, MemoryDescriptorList_unk_out = 0xffffe0003bcd4b60
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcd4b60, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002be83560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002be83560, MemoryDescriptorList_unk = 0xffffe0003bcd4b60
IoFreeMdl Mdl_unk = 0xffffe0003bcd4b60
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcd4b60
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcd4b60, MemoryDescriptorList_unk_out = 0xffffe0003bcd4b60
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcd4b60, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002be96560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002be96560, MemoryDescriptorList_unk = 0xffffe0003bcd4b60
IoFreeMdl Mdl_unk = 0xffffe0003bcd4b60
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c0f7930
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c0f7930, MemoryDescriptorList_unk_out = 0xffffe0003c0f7930
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c0f7930, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002be98560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002be98560, MemoryDescriptorList_unk = 0xffffe0003c0f7930
IoFreeMdl Mdl_unk = 0xffffe0003c0f7930
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c5ee960
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c5ee960, MemoryDescriptorList_unk_out = 0xffffe0003c5ee960
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c5ee960, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002bfb1560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bfb1560, MemoryDescriptorList_unk = 0xffffe0003c5ee960
IoFreeMdl Mdl_unk = 0xffffe0003c5ee960
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002bfb5560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bfb5560, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002bfb7560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bfb7560, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002bfc2560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002bfc2560, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c01c560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c01c560, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8680
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8680, MemoryDescriptorList_unk_out = 0xffffe0003c1f8680
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1f8680, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c2a5560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c2a5560, MemoryDescriptorList_unk = 0xffffe0003c1f8680
IoFreeMdl Mdl_unk = 0xffffe0003c1f8680
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c2b2560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c2b2560, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461f8890
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461f8890, MemoryDescriptorList_unk_out = 0xffffe000461f8890
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000461f8890, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c2b4560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c2b4560, MemoryDescriptorList_unk = 0xffffe000461f8890
IoFreeMdl Mdl_unk = 0xffffe000461f8890
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c2c9560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c2c9560, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c31f560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c31f560, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c375560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c375560, MemoryDescriptorList_unk = 0xffffe0003be355f0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c591560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c591560, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002d1b2560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d1b2560, MemoryDescriptorList_unk = 0xffffe00044551330
IoFreeMdl Mdl_unk = 0xffffe00044551330
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473be010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473be010, MemoryDescriptorList_unk_out = 0xffffe000473be010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002d1e4560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d1e4560, MemoryDescriptorList_unk = 0xffffe000473be010
IoFreeMdl Mdl_unk = 0xffffe000473be010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473be010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473be010, MemoryDescriptorList_unk_out = 0xffffe000473be010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002d8ee560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d8ee560, MemoryDescriptorList_unk = 0xffffe000473be010
IoFreeMdl Mdl_unk = 0xffffe000473be010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473be010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473be010, MemoryDescriptorList_unk_out = 0xffffe000473be010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002e480560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e480560, MemoryDescriptorList_unk = 0xffffe000473be010
IoFreeMdl Mdl_unk = 0xffffe000473be010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b724260
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b724260, MemoryDescriptorList_unk_out = 0xffffe0003b724260
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b724260, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002e513560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e513560, MemoryDescriptorList_unk = 0xffffe0003b724260
IoFreeMdl Mdl_unk = 0xffffe0003b724260
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b724260
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b724260, MemoryDescriptorList_unk_out = 0xffffe0003b724260
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b724260, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002e8b2560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e8b2560, MemoryDescriptorList_unk = 0xffffe0003b724260
IoFreeMdl Mdl_unk = 0xffffe0003b724260
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b724260
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b724260, MemoryDescriptorList_unk_out = 0xffffe0003b724260
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b724260, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002f473560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f473560, MemoryDescriptorList_unk = 0xffffe0003b724260
IoFreeMdl Mdl_unk = 0xffffe0003b724260
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b724260
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b724260, MemoryDescriptorList_unk_out = 0xffffe0003b724260
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b724260, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002f520560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f520560, MemoryDescriptorList_unk = 0xffffe0003b724260
IoFreeMdl Mdl_unk = 0xffffe0003b724260
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002f675560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f675560, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002f6f6560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002f6f6560, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00033c27560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00033c27560, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0003579e560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0003579e560, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00049b9d560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00049b9d560, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae91d10
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae91d10, MemoryDescriptorList_unk_out = 0xffffe0003ae91d10
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae91d10, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0004a72f560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0004a72f560, MemoryDescriptorList_unk = 0xffffe0003ae91d10
IoFreeMdl Mdl_unk = 0xffffe0003ae91d10
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae91d10
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae91d10, MemoryDescriptorList_unk_out = 0xffffe0003ae91d10
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae91d10, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd000291ae560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd000291ae560, MemoryDescriptorList_unk = 0xffffe0003ae91d10
IoFreeMdl Mdl_unk = 0xffffe0003ae91d10
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029408560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029408560, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae91d10
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae91d10, MemoryDescriptorList_unk_out = 0xffffe0003ae91d10
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae91d10, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002987d560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002987d560, MemoryDescriptorList_unk = 0xffffe0003ae91d10
IoFreeMdl Mdl_unk = 0xffffe0003ae91d10
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae91d10
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae91d10, MemoryDescriptorList_unk_out = 0xffffe0003ae91d10
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae91d10, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029898560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029898560, MemoryDescriptorList_unk = 0xffffe0003ae91d10
IoFreeMdl Mdl_unk = 0xffffe0003ae91d10
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae679b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae679b0, MemoryDescriptorList_unk_out = 0xffffe0003ae679b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae679b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029aa7560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029aa7560, MemoryDescriptorList_unk = 0xffffe0003ae679b0
IoFreeMdl Mdl_unk = 0xffffe0003ae679b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bc64010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bc64010, MemoryDescriptorList_unk_out = 0xffffe0003bc64010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bc64010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029aae560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029aae560, MemoryDescriptorList_unk = 0xffffe0003bc64010
IoFreeMdl Mdl_unk = 0xffffe0003bc64010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461f8db0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461f8db0, MemoryDescriptorList_unk_out = 0xffffe000461f8db0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000461f8db0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029dcd560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029dcd560, MemoryDescriptorList_unk = 0xffffe000461f8db0
IoFreeMdl Mdl_unk = 0xffffe000461f8db0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029ddc560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029ddc560, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a060560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a060560, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a077560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a077560, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a07f560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a07f560, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a0a1560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a0a1560, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a0c2560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a0c2560, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a26e560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a26e560, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a273560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a273560, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c351920
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c351920, MemoryDescriptorList_unk_out = 0xffffe0003c351920
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c351920, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a282560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a282560, MemoryDescriptorList_unk = 0xffffe0003c351920
IoFreeMdl Mdl_unk = 0xffffe0003c351920
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473be010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473be010, MemoryDescriptorList_unk_out = 0xffffe000473be010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a29a560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a29a560, MemoryDescriptorList_unk = 0xffffe000473be010
IoFreeMdl Mdl_unk = 0xffffe000473be010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a4fc560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a4fc560, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002ae2f560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002ae2f560, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1b4300
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1b4300, MemoryDescriptorList_unk_out = 0xffffe0003c1b4300
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1b4300, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c4d5560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c4d5560, MemoryDescriptorList_unk = 0xffffe0003c1b4300
IoFreeMdl Mdl_unk = 0xffffe0003c1b4300
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c552560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c552560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c6a7560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c6a7560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c6a8560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c6a8560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002cd6e560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002cd6e560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002cdec560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002cdec560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002d6cb560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d6cb560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002e387560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e387560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002e388560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e388560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002e56a560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e56a560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002e5b2560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002e5b2560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00045b65560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00045b65560, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0004a6a4560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0004a6a4560, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0004a7bf560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0004a7bf560, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029226560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029226560, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ee71f40, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd00029804560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd00029804560, MemoryDescriptorList_unk = 0xffffe0003ee71f40
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a37a560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a37a560, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae54160
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae54160, MemoryDescriptorList_unk_out = 0xffffe0003ae54160
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003ae54160, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002a663560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a663560, MemoryDescriptorList_unk = 0xffffe0003ae54160
IoFreeMdl Mdl_unk = 0xffffe0003ae54160
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002b918560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002b918560, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000473be010
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000473be010, MemoryDescriptorList_unk_out = 0xffffe000473be010
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c73d560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c73d560, MemoryDescriptorList_unk = 0xffffe000473be010
IoFreeMdl Mdl_unk = 0xffffe000473be010
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c78c560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c78c560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c796560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c796560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b9d74c0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002c797560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002c797560, MemoryDescriptorList_unk = 0xffffe0003b9d74c0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002cdbf560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002cdbf560, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000, ret_val_out = 0x0
IoAllocateMdl VirtualAddress_ptr = 0xfffff800fc2cb560, Length = 0x8, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b4458b0, AccessMode_unk = 0x0, CacheType_unk = 0x0, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x1d00000010, ret_val_ptr_out = 0xffffd0002d693560
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002d693560, MemoryDescriptorList_unk = 0xffffe0003b4458b0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd00049a9c4d8, Interval = -10000000
Code Block #19 (EP #179)
»
Information Value
Trigger PspSystemThreadStartup+0x3f
Start Address 0xfffff800fc2ba230
Execution Path #179 (length: 510, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 510
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
MmIsAddressValid VirtualAddress_ptr = 0xfffff80041962d10, ret_val_out = 1
_wcsicmp _String1 = ⴐ䆖ⴐ䆖, _String2 = 360FsFlt.sys, ret_val_out = 11485
MmIsAddressValid VirtualAddress_ptr = 0xfffff80041962d10, ret_val_out = 1
_wcsicmp _String1 = ⴐ䆖ⴐ䆖, _String2 = 360FsFlt.sys, ret_val_out = 11485
MmIsAddressValid VirtualAddress_ptr = 0xfffff80041962d10, ret_val_out = 1
_wcsicmp _String1 = ⴐ䆖ⴐ䆖, _String2 = 360FsFlt.sys, ret_val_out = 11485
MmIsAddressValid VirtualAddress_ptr = 0xfffff80041962d10, ret_val_out = 1
_wcsicmp _String1 = ⴐ䆖ⴐ䆖, _String2 = 360FsFlt.sys, ret_val_out = 11485
MmIsAddressValid VirtualAddress_ptr = 0xfffff80041962d10, ret_val_out = 1
_wcsicmp _String1 = ⴐ䆖ⴐ䆖, _String2 = 360FsFlt.sys, ret_val_out = 11485
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ff88, ret_val_out = 1
_wcsicmp _String1 = ntoskrnl.exe, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ff88, ret_val_out = 1
_wcsicmp _String1 = ntoskrnl.exe, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ff88, ret_val_out = 1
_wcsicmp _String1 = ntoskrnl.exe, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ff88, ret_val_out = 1
_wcsicmp _String1 = ntoskrnl.exe, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ff88, ret_val_out = 1
_wcsicmp _String1 = ntoskrnl.exe, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fd18, ret_val_out = 1
_wcsicmp _String1 = hal.dll, _String2 = 360FsFlt.sys, ret_val_out = 53
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fd18, ret_val_out = 1
_wcsicmp _String1 = hal.dll, _String2 = 360FsFlt.sys, ret_val_out = 53
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fd18, ret_val_out = 1
_wcsicmp _String1 = hal.dll, _String2 = 360FsFlt.sys, ret_val_out = 53
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fd18, ret_val_out = 1
_wcsicmp _String1 = hal.dll, _String2 = 360FsFlt.sys, ret_val_out = 53
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fd18, ret_val_out = 1
_wcsicmp _String1 = hal.dll, _String2 = 360FsFlt.sys, ret_val_out = 53
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fba0, ret_val_out = 1
_wcsicmp _String1 = kdcom.dll, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fba0, ret_val_out = 1
_wcsicmp _String1 = kdcom.dll, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fba0, ret_val_out = 1
_wcsicmp _String1 = kdcom.dll, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fba0, ret_val_out = 1
_wcsicmp _String1 = kdcom.dll, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fba0, ret_val_out = 1
_wcsicmp _String1 = kdcom.dll, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fa30, ret_val_out = 1
_wcsicmp _String1 = mcupdate.dll, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fa30, ret_val_out = 1
_wcsicmp _String1 = mcupdate.dll, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fa30, ret_val_out = 1
_wcsicmp _String1 = mcupdate.dll, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fa30, ret_val_out = 1
_wcsicmp _String1 = mcupdate.dll, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41fa30, ret_val_out = 1
_wcsicmp _String1 = mcupdate.dll, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f8b0, ret_val_out = 1
_wcsicmp _String1 = werkernel.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f8b0, ret_val_out = 1
_wcsicmp _String1 = werkernel.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f8b0, ret_val_out = 1
_wcsicmp _String1 = werkernel.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f8b0, ret_val_out = 1
_wcsicmp _String1 = werkernel.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f8b0, ret_val_out = 1
_wcsicmp _String1 = werkernel.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f748, ret_val_out = 1
_wcsicmp _String1 = CLFS.SYS, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f748, ret_val_out = 1
_wcsicmp _String1 = CLFS.SYS, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f748, ret_val_out = 1
_wcsicmp _String1 = CLFS.SYS, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f748, ret_val_out = 1
_wcsicmp _String1 = CLFS.SYS, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f748, ret_val_out = 1
_wcsicmp _String1 = CLFS.SYS, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f5e0, ret_val_out = 1
_wcsicmp _String1 = tm.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f5e0, ret_val_out = 1
_wcsicmp _String1 = tm.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f5e0, ret_val_out = 1
_wcsicmp _String1 = tm.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f5e0, ret_val_out = 1
_wcsicmp _String1 = tm.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f5e0, ret_val_out = 1
_wcsicmp _String1 = tm.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f470, ret_val_out = 1
_wcsicmp _String1 = PSHED.dll, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f470, ret_val_out = 1
_wcsicmp _String1 = PSHED.dll, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f470, ret_val_out = 1
_wcsicmp _String1 = PSHED.dll, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f470, ret_val_out = 1
_wcsicmp _String1 = PSHED.dll, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f470, ret_val_out = 1
_wcsicmp _String1 = PSHED.dll, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f310, ret_val_out = 1
_wcsicmp _String1 = BOOTVID.dll, _String2 = 360FsFlt.sys, ret_val_out = 47
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f310, ret_val_out = 1
_wcsicmp _String1 = BOOTVID.dll, _String2 = 360FsFlt.sys, ret_val_out = 47
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f310, ret_val_out = 1
_wcsicmp _String1 = BOOTVID.dll, _String2 = 360FsFlt.sys, ret_val_out = 47
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f310, ret_val_out = 1
_wcsicmp _String1 = BOOTVID.dll, _String2 = 360FsFlt.sys, ret_val_out = 47
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41f310, ret_val_out = 1
_wcsicmp _String1 = BOOTVID.dll, _String2 = 360FsFlt.sys, ret_val_out = 47
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e120, ret_val_out = 1
_wcsicmp _String1 = cmimcext.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e120, ret_val_out = 1
_wcsicmp _String1 = cmimcext.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e120, ret_val_out = 1
_wcsicmp _String1 = cmimcext.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e120, ret_val_out = 1
_wcsicmp _String1 = cmimcext.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e120, ret_val_out = 1
_wcsicmp _String1 = cmimcext.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41efb0, ret_val_out = 1
_wcsicmp _String1 = ntosext.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41efb0, ret_val_out = 1
_wcsicmp _String1 = ntosext.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41efb0, ret_val_out = 1
_wcsicmp _String1 = ntosext.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41efb0, ret_val_out = 1
_wcsicmp _String1 = ntosext.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41efb0, ret_val_out = 1
_wcsicmp _String1 = ntosext.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ee40, ret_val_out = 1
_wcsicmp _String1 = CI.dll, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ee40, ret_val_out = 1
_wcsicmp _String1 = CI.dll, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ee40, ret_val_out = 1
_wcsicmp _String1 = CI.dll, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ee40, ret_val_out = 1
_wcsicmp _String1 = CI.dll, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ee40, ret_val_out = 1
_wcsicmp _String1 = CI.dll, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ecb8, ret_val_out = 1
_wcsicmp _String1 = msrpc.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ecb8, ret_val_out = 1
_wcsicmp _String1 = msrpc.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ecb8, ret_val_out = 1
_wcsicmp _String1 = msrpc.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ecb8, ret_val_out = 1
_wcsicmp _String1 = msrpc.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41ecb8, ret_val_out = 1
_wcsicmp _String1 = msrpc.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41eb38, ret_val_out = 1
_wcsicmp _String1 = FLTMGR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41eb38, ret_val_out = 1
_wcsicmp _String1 = FLTMGR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41eb38, ret_val_out = 1
_wcsicmp _String1 = FLTMGR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41eb38, ret_val_out = 1
_wcsicmp _String1 = FLTMGR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41eb38, ret_val_out = 1
_wcsicmp _String1 = FLTMGR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e9c0, ret_val_out = 1
_wcsicmp _String1 = ksecdd.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e9c0, ret_val_out = 1
_wcsicmp _String1 = ksecdd.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e9c0, ret_val_out = 1
_wcsicmp _String1 = ksecdd.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e9c0, ret_val_out = 1
_wcsicmp _String1 = ksecdd.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e9c0, ret_val_out = 1
_wcsicmp _String1 = ksecdd.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e830, ret_val_out = 1
_wcsicmp _String1 = clipsp.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e830, ret_val_out = 1
_wcsicmp _String1 = clipsp.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e830, ret_val_out = 1
_wcsicmp _String1 = clipsp.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e830, ret_val_out = 1
_wcsicmp _String1 = clipsp.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e830, ret_val_out = 1
_wcsicmp _String1 = clipsp.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e6b8, ret_val_out = 1
_wcsicmp _String1 = Wdf01000.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e6b8, ret_val_out = 1
_wcsicmp _String1 = Wdf01000.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e6b8, ret_val_out = 1
_wcsicmp _String1 = Wdf01000.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e6b8, ret_val_out = 1
_wcsicmp _String1 = Wdf01000.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e6b8, ret_val_out = 1
_wcsicmp _String1 = Wdf01000.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e530, ret_val_out = 1
_wcsicmp _String1 = WDFLDR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e530, ret_val_out = 1
_wcsicmp _String1 = WDFLDR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e530, ret_val_out = 1
_wcsicmp _String1 = WDFLDR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e530, ret_val_out = 1
_wcsicmp _String1 = WDFLDR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e530, ret_val_out = 1
_wcsicmp _String1 = WDFLDR.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e3c0, ret_val_out = 1
_wcsicmp _String1 = acpiex.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e3c0, ret_val_out = 1
_wcsicmp _String1 = acpiex.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e3c0, ret_val_out = 1
_wcsicmp _String1 = acpiex.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e3c0, ret_val_out = 1
_wcsicmp _String1 = acpiex.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a41e3c0, ret_val_out = 1
_wcsicmp _String1 = acpiex.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b120, ret_val_out = 1
_wcsicmp _String1 = WppRecorder.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b120, ret_val_out = 1
_wcsicmp _String1 = WppRecorder.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b120, ret_val_out = 1
_wcsicmp _String1 = WppRecorder.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b120, ret_val_out = 1
_wcsicmp _String1 = WppRecorder.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b120, ret_val_out = 1
_wcsicmp _String1 = WppRecorder.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bfc0, ret_val_out = 1
_wcsicmp _String1 = cng.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bfc0, ret_val_out = 1
_wcsicmp _String1 = cng.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bfc0, ret_val_out = 1
_wcsicmp _String1 = cng.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bfc0, ret_val_out = 1
_wcsicmp _String1 = cng.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bfc0, ret_val_out = 1
_wcsicmp _String1 = cng.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43be50, ret_val_out = 1
_wcsicmp _String1 = ACPI.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43be50, ret_val_out = 1
_wcsicmp _String1 = ACPI.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43be50, ret_val_out = 1
_wcsicmp _String1 = ACPI.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43be50, ret_val_out = 1
_wcsicmp _String1 = ACPI.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43be50, ret_val_out = 1
_wcsicmp _String1 = ACPI.sys, _String2 = 360FsFlt.sys, ret_val_out = 46
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bcd0, ret_val_out = 1
_wcsicmp _String1 = WMILIB.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bcd0, ret_val_out = 1
_wcsicmp _String1 = WMILIB.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bcd0, ret_val_out = 1
_wcsicmp _String1 = WMILIB.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bcd0, ret_val_out = 1
_wcsicmp _String1 = WMILIB.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bcd0, ret_val_out = 1
_wcsicmp _String1 = WMILIB.SYS, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bb50, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRT.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bb50, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRT.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bb50, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRT.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bb50, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRT.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43bb50, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRT.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b9c0, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRTProxy.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b9c0, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRTProxy.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b9c0, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRTProxy.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b9c0, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRTProxy.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b9c0, ret_val_out = 1
_wcsicmp _String1 = WindowsTrustedRTProxy.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b860, ret_val_out = 1
_wcsicmp _String1 = pcw.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b860, ret_val_out = 1
_wcsicmp _String1 = pcw.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b860, ret_val_out = 1
_wcsicmp _String1 = pcw.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b860, ret_val_out = 1
_wcsicmp _String1 = pcw.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b860, ret_val_out = 1
_wcsicmp _String1 = pcw.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b6f0, ret_val_out = 1
_wcsicmp _String1 = msisadrv.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b6f0, ret_val_out = 1
_wcsicmp _String1 = msisadrv.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b6f0, ret_val_out = 1
_wcsicmp _String1 = msisadrv.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b6f0, ret_val_out = 1
_wcsicmp _String1 = msisadrv.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b6f0, ret_val_out = 1
_wcsicmp _String1 = msisadrv.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b588, ret_val_out = 1
_wcsicmp _String1 = pci.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b588, ret_val_out = 1
_wcsicmp _String1 = pci.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b588, ret_val_out = 1
_wcsicmp _String1 = pci.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b588, ret_val_out = 1
_wcsicmp _String1 = pci.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b588, ret_val_out = 1
_wcsicmp _String1 = pci.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b410, ret_val_out = 1
_wcsicmp _String1 = vdrvroot.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b410, ret_val_out = 1
_wcsicmp _String1 = vdrvroot.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b410, ret_val_out = 1
_wcsicmp _String1 = vdrvroot.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b410, ret_val_out = 1
_wcsicmp _String1 = vdrvroot.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b410, ret_val_out = 1
_wcsicmp _String1 = vdrvroot.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b2b0, ret_val_out = 1
_wcsicmp _String1 = pdc.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b2b0, ret_val_out = 1
_wcsicmp _String1 = pdc.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b2b0, ret_val_out = 1
_wcsicmp _String1 = pdc.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b2b0, ret_val_out = 1
_wcsicmp _String1 = pdc.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a43b2b0, ret_val_out = 1
_wcsicmp _String1 = pdc.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443120, ret_val_out = 1
_wcsicmp _String1 = CEA.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443120, ret_val_out = 1
_wcsicmp _String1 = CEA.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443120, ret_val_out = 1
_wcsicmp _String1 = CEA.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443120, ret_val_out = 1
_wcsicmp _String1 = CEA.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443120, ret_val_out = 1
_wcsicmp _String1 = CEA.sys, _String2 = 360FsFlt.sys, ret_val_out = 48
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443fb0, ret_val_out = 1
_wcsicmp _String1 = partmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443fb0, ret_val_out = 1
_wcsicmp _String1 = partmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443fb0, ret_val_out = 1
_wcsicmp _String1 = partmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443fb0, ret_val_out = 1
_wcsicmp _String1 = partmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443fb0, ret_val_out = 1
_wcsicmp _String1 = partmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 61
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443e40, ret_val_out = 1
_wcsicmp _String1 = spaceport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443e40, ret_val_out = 1
_wcsicmp _String1 = spaceport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443e40, ret_val_out = 1
_wcsicmp _String1 = spaceport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443e40, ret_val_out = 1
_wcsicmp _String1 = spaceport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443e40, ret_val_out = 1
_wcsicmp _String1 = spaceport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443cc0, ret_val_out = 1
_wcsicmp _String1 = volmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443cc0, ret_val_out = 1
_wcsicmp _String1 = volmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443cc0, ret_val_out = 1
_wcsicmp _String1 = volmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443cc0, ret_val_out = 1
_wcsicmp _String1 = volmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443cc0, ret_val_out = 1
_wcsicmp _String1 = volmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443b58, ret_val_out = 1
_wcsicmp _String1 = volmgrx.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443b58, ret_val_out = 1
_wcsicmp _String1 = volmgrx.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443b58, ret_val_out = 1
_wcsicmp _String1 = volmgrx.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443b58, ret_val_out = 1
_wcsicmp _String1 = volmgrx.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443b58, ret_val_out = 1
_wcsicmp _String1 = volmgrx.sys, _String2 = 360FsFlt.sys, ret_val_out = 67
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4439e0, ret_val_out = 1
_wcsicmp _String1 = mountmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4439e0, ret_val_out = 1
_wcsicmp _String1 = mountmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4439e0, ret_val_out = 1
_wcsicmp _String1 = mountmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4439e0, ret_val_out = 1
_wcsicmp _String1 = mountmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4439e0, ret_val_out = 1
_wcsicmp _String1 = mountmgr.sys, _String2 = 360FsFlt.sys, ret_val_out = 58
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443880, ret_val_out = 1
_wcsicmp _String1 = storahci.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443880, ret_val_out = 1
_wcsicmp _String1 = storahci.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443880, ret_val_out = 1
_wcsicmp _String1 = storahci.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443880, ret_val_out = 1
_wcsicmp _String1 = storahci.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443880, ret_val_out = 1
_wcsicmp _String1 = storahci.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443708, ret_val_out = 1
_wcsicmp _String1 = storport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443708, ret_val_out = 1
_wcsicmp _String1 = storport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443708, ret_val_out = 1
_wcsicmp _String1 = storport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443708, ret_val_out = 1
_wcsicmp _String1 = storport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443708, ret_val_out = 1
_wcsicmp _String1 = storport.sys, _String2 = 360FsFlt.sys, ret_val_out = 64
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443590, ret_val_out = 1
_wcsicmp _String1 = EhStorClass.sys, _String2 = 360FsFlt.sys, ret_val_out = 50
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443590, ret_val_out = 1
_wcsicmp _String1 = EhStorClass.sys, _String2 = 360FsFlt.sys, ret_val_out = 50
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443590, ret_val_out = 1
_wcsicmp _String1 = EhStorClass.sys, _String2 = 360FsFlt.sys, ret_val_out = 50
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443590, ret_val_out = 1
_wcsicmp _String1 = EhStorClass.sys, _String2 = 360FsFlt.sys, ret_val_out = 50
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443590, ret_val_out = 1
_wcsicmp _String1 = EhStorClass.sys, _String2 = 360FsFlt.sys, ret_val_out = 50
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443420, ret_val_out = 1
_wcsicmp _String1 = fileinfo.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443420, ret_val_out = 1
_wcsicmp _String1 = fileinfo.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443420, ret_val_out = 1
_wcsicmp _String1 = fileinfo.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443420, ret_val_out = 1
_wcsicmp _String1 = fileinfo.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a443420, ret_val_out = 1
_wcsicmp _String1 = fileinfo.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4432c0, ret_val_out = 1
_wcsicmp _String1 = Wof.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4432c0, ret_val_out = 1
_wcsicmp _String1 = Wof.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4432c0, ret_val_out = 1
_wcsicmp _String1 = Wof.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4432c0, ret_val_out = 1
_wcsicmp _String1 = Wof.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4432c0, ret_val_out = 1
_wcsicmp _String1 = Wof.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442160, ret_val_out = 1
_wcsicmp _String1 = NTFS.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442160, ret_val_out = 1
_wcsicmp _String1 = NTFS.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442160, ret_val_out = 1
_wcsicmp _String1 = NTFS.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442160, ret_val_out = 1
_wcsicmp _String1 = NTFS.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442160, ret_val_out = 1
_wcsicmp _String1 = NTFS.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442fb0, ret_val_out = 1
_wcsicmp _String1 = Fs_Rec.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442fb0, ret_val_out = 1
_wcsicmp _String1 = Fs_Rec.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442fb0, ret_val_out = 1
_wcsicmp _String1 = Fs_Rec.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442fb0, ret_val_out = 1
_wcsicmp _String1 = Fs_Rec.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442fb0, ret_val_out = 1
_wcsicmp _String1 = Fs_Rec.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442e40, ret_val_out = 1
_wcsicmp _String1 = ndis.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442e40, ret_val_out = 1
_wcsicmp _String1 = ndis.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442e40, ret_val_out = 1
_wcsicmp _String1 = ndis.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442e40, ret_val_out = 1
_wcsicmp _String1 = ndis.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442e40, ret_val_out = 1
_wcsicmp _String1 = ndis.sys, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442ca8, ret_val_out = 1
_wcsicmp _String1 = NETIO.SYS, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442ca8, ret_val_out = 1
_wcsicmp _String1 = NETIO.SYS, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442ca8, ret_val_out = 1
_wcsicmp _String1 = NETIO.SYS, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442ca8, ret_val_out = 1
_wcsicmp _String1 = NETIO.SYS, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442ca8, ret_val_out = 1
_wcsicmp _String1 = NETIO.SYS, _String2 = 360FsFlt.sys, ret_val_out = 59
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442b30, ret_val_out = 1
_wcsicmp _String1 = ksecpkg.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442b30, ret_val_out = 1
_wcsicmp _String1 = ksecpkg.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442b30, ret_val_out = 1
_wcsicmp _String1 = ksecpkg.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442b30, ret_val_out = 1
_wcsicmp _String1 = ksecpkg.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442b30, ret_val_out = 1
_wcsicmp _String1 = ksecpkg.sys, _String2 = 360FsFlt.sys, ret_val_out = 56
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4429b8, ret_val_out = 1
_wcsicmp _String1 = tcpip.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4429b8, ret_val_out = 1
_wcsicmp _String1 = tcpip.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4429b8, ret_val_out = 1
_wcsicmp _String1 = tcpip.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4429b8, ret_val_out = 1
_wcsicmp _String1 = tcpip.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4429b8, ret_val_out = 1
_wcsicmp _String1 = tcpip.sys, _String2 = 360FsFlt.sys, ret_val_out = 65
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442808, ret_val_out = 1
_wcsicmp _String1 = fwpkclnt.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442808, ret_val_out = 1
_wcsicmp _String1 = fwpkclnt.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442808, ret_val_out = 1
_wcsicmp _String1 = fwpkclnt.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442808, ret_val_out = 1
_wcsicmp _String1 = fwpkclnt.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442808, ret_val_out = 1
_wcsicmp _String1 = fwpkclnt.sys, _String2 = 360FsFlt.sys, ret_val_out = 51
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442690, ret_val_out = 1
_wcsicmp _String1 = wfplwfs.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442690, ret_val_out = 1
_wcsicmp _String1 = wfplwfs.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442690, ret_val_out = 1
_wcsicmp _String1 = wfplwfs.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a442690, ret_val_out = 1
_wcsicmp _String1 = wfplwfs.sys, _String2 = 360FsFlt.sys, ret_val_out = 68
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
KeDelayExecutionThread WaitMode_unk = 0x0, Alertable = 0, Interval_ptr = 0xffffd0002e35e4d8, Interval = -50000000, ret_val_out = 0x0
Code Block #26 (EP #38)
»
Information Value
Trigger KiDeliverApc+0x131
Start Address 0xfffff800fc2bc730
Execution Path #38 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
KeTestAlertThread ret_val_out = 0x0

Kernel Graph 2

Kernel Graph

Kernel Graph Legend
Code Block #2 (EP #1)
»
Information Value
Trigger KiInterruptDispatchNoLockNoEtw+0x1dc
Start Address 0xffffe0003af78756
Execution Path #1 (length: 823, count: 1, processes: 1)
»
Information Value
Sequence Length 823
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
ExAcquireSpinLockSharedAtDpcLevel SpinLock_unk = 0xfffff80041a161c0, SpinLock_unk_out = 0xfffff80041a161c0
ExReleaseSpinLockSharedFromDpcLevel SpinLock_unk = 0xfffff80041a161c0, SpinLock_unk_out = 0xfffff80041a161c0
MmGetNextSession ret_val_out = 0xffffe0003bb08100
MmAttachSession ret_val_out = 0x0
PsGetProcessSessionIdEx ret_val_out = 0x0
RtlLookupFunctionTable ret_val_out = 0xfffff961ffce9000
ExAllocatePoolWithTag PoolType_unk = 0x200, NumberOfBytes_ptr = 0x80, Tag = 0x70764946, ret_val_ptr_out = 0xffffe0003c5f6280
RtlImageNtHeader BaseAddress_ptr = 0xfffff961ffce0000, ret_val_unk_out = 0xfffff961ffce00e0
MmIsSessionAddress ret_val_out = 0x0
MmIsSessionAddress ret_val_out = 0x1
RtlLookupFunctionTable ret_val_out = 0xfffff962004a1000
MmIsSessionAddress ret_val_out = 0x1
RtlLookupFunctionTable ret_val_out = 0xfffff961fff0d000
RtlImageNtHeader BaseAddress_ptr = 0xfffff96200170000, ret_val_unk_out = 0xfffff962001700f0
RtlImageNtHeader BaseAddress_ptr = 0xfffff961ffe00000, ret_val_unk_out = 0xfffff961ffe000f0
ExFreePool P_ptr = 0xffffe0003c5f6280
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x45baa, Tag = 0x63536c41, ret_val_ptr_out = 0xffffe0003c8ce000
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x45937, Tag = 0x63536c41, ret_val_ptr_out = 0xffffe0003c959000
ExFreePool P_ptr = 0xffffe0003c8ce000
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce19c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce19d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce19e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce19f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a10, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a20, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a30, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a50, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a60, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a70, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1a90, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1aa0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ab0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ac0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ad0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ae0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1af0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b10, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b20, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b30, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b50, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b60, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b70, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1b90, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ba0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1bb0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1bc0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1bd0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1be0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1bf0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c10, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c20, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c30, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c50, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c60, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c70, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1c90, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ca0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1cb0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1cc0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1cd0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ce0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1cf0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d10, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d20, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d30, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d50, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d60, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d70, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1d90, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1da0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1db0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1dc0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1dd0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1de0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1df0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e10, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e20, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e30, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e50, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e60, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e70, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1e90, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ea0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1eb0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ec0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ed0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ee0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ef0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f10, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f20, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f30, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f50, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f60, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f70, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1f90, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1fa0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1fb0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1fc0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1fd0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1fe0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce1ff0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2000, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2010, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2020, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2030, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2040, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2050, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2060, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2070, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2080, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2090, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce20a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce20b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce20c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce20d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce20e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce20f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2100, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2110, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2120, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2130, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2140, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2150, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2160, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2170, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2180, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2190, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce21a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce21b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce21c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce21d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce21e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce21f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2200, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2210, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2220, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2230, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2240, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2250, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2260, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2270, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2280, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2290, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce22a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce22b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce22c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce22d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce22e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce22f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2300, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2310, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2320, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2330, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2340, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2350, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2360, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2370, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2380, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2390, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce23a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce23b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce23c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce23d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce23e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce23f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2400, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2410, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2420, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2430, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2440, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2450, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2460, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2470, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2480, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2490, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce24a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce24b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce24c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce24d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce24e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce24f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2500, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2510, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2520, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2530, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2540, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2550, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2560, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2570, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2580, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2590, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce25a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce25b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce25c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce25d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce25e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce25f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2600, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2610, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2620, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2630, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2640, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2650, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2660, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2670, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2680, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2690, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce26a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce26b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce26c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce26d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce26e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce26f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2700, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2710, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2720, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2730, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2740, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2750, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2760, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2770, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2780, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2790, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce27a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce27b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce27c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce27d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce27e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce27f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2800, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2810, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2820, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2830, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2840, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2850, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2860, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2870, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2880, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2890, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce28a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce28b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce28c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce28d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce28e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce28f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2900, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2910, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2920, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2930, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff961ffce2940, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d573d08, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionTable ret_val_out = 0xfffff961ffce9000
RtlLookupFunctionTable ret_val_out = 0xfffff961ffce9000
MmIsSessionAddress ret_val_out = 0x1
RtlImageNtHeader BaseAddress_ptr = 0xfffff961ffce0000, ret_val_unk_out = 0xfffff961ffce00e0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x4a07b, Tag = 0x63536c41, ret_val_ptr_out = 0xffffe0003c959000
ExFreePool P_ptr = 0xffffe0003c8ce000
ExAcquireSpinLockSharedAtDpcLevel SpinLock_unk = 0xfffff80041a161c0, SpinLock_unk_out = 0xfffff80041a161c0
ExReleaseSpinLockSharedFromDpcLevel SpinLock_unk = 0xfffff80041a161c0, SpinLock_unk_out = 0xfffff80041a161c0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffce01e8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffce01e8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffce01e8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffce01e8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffce01e8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffce0300
RtlImageDirectoryEntryToData BaseAddress_ptr = 0xfffff961ffce0000, MappedAsImage = 1, Directory = 0x0, Size_ptr_out = 0xffffd0002d573a90, ret_val_ptr_out = 0xfffff961ffcfc000
RtlImageDirectoryEntryToData BaseAddress_ptr = 0xfffff961ffce0000, MappedAsImage = 1, Directory = 0xc, Size_ptr_out = 0xffffd0002d573a90, ret_val_ptr_out = 0xfffff961ffcea000
RtlImageDirectoryEntryToData BaseAddress_ptr = 0xfffff961ffce0000, MappedAsImage = 1, Directory = 0xa, Size_ptr_out = 0xffffd0002d573a90, ret_val_ptr_out = 0xfffff961ffce7060
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x49d24, Tag = 0x63536c41, ret_val_ptr_out = 0xffffe0003c8ce000
ExFreePool P_ptr = 0xffffe0003c959000
RtlImageNtHeader BaseAddress_ptr = 0xfffff961ffce0000, ret_val_unk_out = 0xfffff961ffce00e0
RtlImageNtHeader BaseAddress_ptr = 0xfffff961ffce0000, ret_val_unk_out = 0xfffff961ffce00e0
RtlLookupFunctionTable ret_val_out = 0xfffff800419b5000
RtlLookupFunctionTable ret_val_out = 0xfffff962004a1000
RtlLookupFunctionTable ret_val_out = 0xfffff962004a1000
MmIsSessionAddress ret_val_out = 0x1
RtlImageNtHeader BaseAddress_ptr = 0xfffff96200170000, ret_val_unk_out = 0xfffff962001700f0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x53b9c, Tag = 0x63536c41, ret_val_ptr_out = 0xffffe0003c959000
ExFreePool P_ptr = 0xffffe0003c8ce000
ExAcquireSpinLockSharedAtDpcLevel SpinLock_unk = 0xfffff80041a161c0, SpinLock_unk_out = 0xfffff80041a161c0
ExReleaseSpinLockSharedFromDpcLevel SpinLock_unk = 0xfffff80041a161c0, SpinLock_unk_out = 0xfffff80041a161c0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff962001701f8
RtlImageDirectoryEntryToData BaseAddress_ptr = 0xfffff96200170000, MappedAsImage = 1, Directory = 0x0, Size_ptr_out = 0xffffd0002d573808, ret_val_ptr_out = 0xfffff962004d5000
RtlImageDirectoryEntryToData BaseAddress_ptr = 0xfffff96200170000, MappedAsImage = 1, Directory = 0xc, Size_ptr_out = 0xffffd0002d573808, ret_val_ptr_out = 0xfffff962004be000
RtlImageDirectoryEntryToData BaseAddress_ptr = 0xfffff96200170000, MappedAsImage = 1, Directory = 0xa, Size_ptr_out = 0xffffd0002d573808, ret_val_ptr_out = 0xfffff96200450680
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x538ff, Tag = 0x63536c41, ret_val_ptr_out = 0xffffe0003c9ad000
ExFreePool P_ptr = 0xffffe0003c959000
RtlImageNtHeader BaseAddress_ptr = 0xfffff96200170000, ret_val_unk_out = 0xfffff962001700f0
RtlLookupFunctionTable ret_val_out = 0xfffff961fff0d000
RtlLookupFunctionTable ret_val_out = 0xfffff961fff0d000
MmIsSessionAddress ret_val_out = 0x1
RtlImageNtHeader BaseAddress_ptr = 0xfffff961ffe00000, ret_val_unk_out = 0xfffff961ffe000f0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x57f5a, Tag = 0x63536c41, ret_val_ptr_out = 0xffffe0003ca01000
ExFreePool P_ptr = 0xffffe0003c9ad000
ExAcquireSpinLockSharedAtDpcLevel SpinLock_unk = 0xfffff80041a161c0, SpinLock_unk_out = 0xfffff80041a161c0
ExReleaseSpinLockSharedFromDpcLevel SpinLock_unk = 0xfffff80041a161c0, SpinLock_unk_out = 0xfffff80041a161c0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff961ffe001f8
RtlImageDirectoryEntryToData BaseAddress_ptr = 0xfffff961ffe00000, MappedAsImage = 1, Directory = 0x0, Size_ptr_out = 0xffffd0002d573808, ret_val_ptr_out = 0xfffff961fff2a000
RtlImageDirectoryEntryToData BaseAddress_ptr = 0xfffff961ffe00000, MappedAsImage = 1, Directory = 0xc, Size_ptr_out = 0xffffd0002d573808, ret_val_ptr_out = 0xfffff961fff19000
RtlImageDirectoryEntryToData BaseAddress_ptr = 0xfffff961ffe00000, MappedAsImage = 1, Directory = 0xa, Size_ptr_out = 0xffffd0002d573808, ret_val_ptr_out = 0xfffff961ffeec730
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x57dbe, Tag = 0x63536c41, ret_val_ptr_out = 0xffffe0003c959000
ExFreePool P_ptr = 0xffffe0003ca01000
RtlImageNtHeader BaseAddress_ptr = 0xfffff961ffe00000, ret_val_unk_out = 0xfffff961ffe000f0
RtlLookupFunctionTable ret_val_out = 0xfffff961ffce9000
RtlImageNtHeader BaseAddress_ptr = 0xfffff961ffce0000, ret_val_unk_out = 0xfffff961ffce00e0
MmDetachSession ret_val_out = 0x0
MmQuitNextSession ret_val_out = 0x0
KeSetCoalescableTimer Timer_unk = 0xffffe0003a471b4d, DueTime_unk = 0xffffffffb50e074b, Period = 0x0, TolerableDelay = 0x13cf, Dpc_unk = 0xffffe0003a47ed64, Timer_unk_out = 0xffffe0003a471b4d, ret_val_out = 0

Kernel Graph 3

Kernel Graph

Kernel Graph Legend
Code Block #3 (EP #174)
»
Information Value
Trigger ExpWorkerThread+0xe7
Start Address 0xffffe0003a774934
Execution Path #174 (length: 998, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 998
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a46df30
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a487ac0
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a487a20
ExpEnumerateCallback ret_val_out = 0xfffff800f7ae64c0
RtlPcToFileHeader PcValue_ptr = 0xfffff800f7ae64c0, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f7ae0000, ret_val_ptr_out = 0xfffff800f7ae0000
ExpEnumerateCallback ret_val_out = 0xfffff80041b86ea4
RtlPcToFileHeader PcValue_ptr = 0xfffff80041b86ea4, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff80041684000, ret_val_ptr_out = 0xfffff80041684000
ExpEnumerateCallback ret_val_out = 0xfffff80041627a20
RtlPcToFileHeader PcValue_ptr = 0xfffff80041627a20, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff80041611000, ret_val_ptr_out = 0xfffff80041611000
ExpEnumerateCallback ret_val_out = 0xfffff800f7ec36f0
RtlPcToFileHeader PcValue_ptr = 0xfffff800f7ec36f0, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f7ea0000, ret_val_ptr_out = 0xfffff800f7ea0000
ExpEnumerateCallback ret_val_out = 0xfffff800f81bdc30
RtlPcToFileHeader PcValue_ptr = 0xfffff800f81bdc30, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f8180000, ret_val_ptr_out = 0xfffff800f8180000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f921c760
RtlPcToFileHeader PcValue_ptr = 0xfffff800f921c760, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f9170000, ret_val_ptr_out = 0xfffff800f9170000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a487980
ExpEnumerateCallback ret_val_out = 0xfffff800f7eea420
RtlPcToFileHeader PcValue_ptr = 0xfffff800f7eea420, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f7ea0000, ret_val_ptr_out = 0xfffff800f7ea0000
ExpEnumerateCallback ret_val_out = 0xfffff800f86f6a30
RtlPcToFileHeader PcValue_ptr = 0xfffff800f86f6a30, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f8630000, ret_val_ptr_out = 0xfffff800f8630000
ExpEnumerateCallback ret_val_out = 0xfffff800f92836b0
RtlPcToFileHeader PcValue_ptr = 0xfffff800f92836b0, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f9170000, ret_val_ptr_out = 0xfffff800f9170000
ExpEnumerateCallback ret_val_out = 0xfffff80041cb5748
RtlPcToFileHeader PcValue_ptr = 0xfffff80041cb5748, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff80041684000, ret_val_ptr_out = 0xfffff80041684000
ExpEnumerateCallback ret_val_out = 0xfffff800f9ee4230
RtlPcToFileHeader PcValue_ptr = 0xfffff800f9ee4230, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f9e50000, ret_val_ptr_out = 0xfffff800f9e50000
ExpEnumerateCallback ret_val_out = 0xfffff800faac8930
RtlPcToFileHeader PcValue_ptr = 0xfffff800faac8930, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800faac0000, ret_val_ptr_out = 0xfffff800faac0000
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a467330
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a467290
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a45ed00
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a49ccb0
ExpEnumerateCallback ret_val_out = 0xfffff800417732b4
RtlPcToFileHeader PcValue_ptr = 0xfffff800417732b4, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff80041684000, ret_val_ptr_out = 0xfffff80041684000
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a499d70
ExpEnumerateCallback ret_val_out = 0xfffff80041cbf62c
RtlPcToFileHeader PcValue_ptr = 0xfffff80041cbf62c, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff80041684000, ret_val_ptr_out = 0xfffff80041684000
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003a4a7cb0
ExpEnumerateCallback ret_val_out = 0xfffff80041b86ec8
RtlPcToFileHeader PcValue_ptr = 0xfffff80041b86ec8, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff80041684000, ret_val_ptr_out = 0xfffff80041684000
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003b091710
ExpEnumerateCallback ret_val_out = 0xfffff800f7c9cf80
RtlPcToFileHeader PcValue_ptr = 0xfffff800f7c9cf80, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f7c90000, ret_val_ptr_out = 0xfffff800f7c90000
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003b5af6d0
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003b5c8270
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003b5c81d0
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0004c915460
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003bdb7650
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0xffffe0003be17530
ExpEnumerateCallback ret_val_out = 0xfffff800f9e34040
RtlPcToFileHeader PcValue_ptr = 0xfffff800f9e34040, BaseOfImage_ptr_out = 0xffffd0002d5ecef8, BaseOfImage_out = 0xfffff800f9e30000, ret_val_ptr_out = 0xfffff800f9e30000
ExpEnumerateCallback ret_val_out = 0x0
ExpGetNextCallback ret_val_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x59417, Tag = 0x6944624f, ret_val_ptr_out = 0xffffe0003c9b1000
KeSetCoalescableTimer Timer_unk = 0xffffe0003af29384, DueTime_unk = 0xffffffffb7eff981, Period = 0x0, TolerableDelay = 0xacb, Dpc_unk = 0xffffe0003af293c4, Timer_unk_out = 0xffffe0003af29384, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b09a080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b09a4d0
_stricmp _Str1 = conhost.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b09a080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b09a4d0
_stricmp _Str1 = conhost.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b09a080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b09a4d0
_stricmp _Str1 = conhost.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b09a080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b09a4d0
_stricmp _Str1 = conhost.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b09a080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b09a4d0
_stricmp _Str1 = conhost.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b09a080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b09a4d0
_stricmp _Str1 = conhost.exe, _Str2 = winlogon.exe, ret_val_out = -20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766fe4, SpinLock_unk_out = 0xffffe0003a766fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f65c, SpinLock_unk_out = 0xffffe0003a76f65c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f65c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76f65c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f47c, SpinLock_unk_out = 0xffffe0003a76f47c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f47c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76f47c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76efe4, SpinLock_unk_out = 0xffffe0003a76efe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76efe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76efe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a43dc, SpinLock_unk_out = 0xffffe0003a7a43dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a43dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7a43dc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76eb5c, SpinLock_unk_out = 0xffffe0003a76eb5c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76eb5c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76eb5c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766b64, SpinLock_unk_out = 0xffffe0003a766b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a45bc, SpinLock_unk_out = 0xffffe0003a7a45bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a45bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7a45bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786b64, SpinLock_unk_out = 0xffffe0003a786b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e79c, SpinLock_unk_out = 0xffffe0003a76e79c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e79c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76e79c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634fe4, SpinLock_unk_out = 0xffffe0003c634fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7866dc, SpinLock_unk_out = 0xffffe0003a7866dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7866dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7866dc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786fe4, SpinLock_unk_out = 0xffffe0003a786fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e97c, SpinLock_unk_out = 0xffffe0003a76e97c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e97c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76e97c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a78773c
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f65c, SpinLock_unk_out = 0xffffe0003a76f65c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f65c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76f65c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f65c, SpinLock_unk_out = 0xffffe0003a76f65c, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f65c, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76f65c
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f65c, SpinLock_unk_out = 0xffffe0003a76f65c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f65c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76f65c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f65c, SpinLock_unk_out = 0xffffe0003a76f65c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f65c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76f65c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f47c, SpinLock_unk_out = 0xffffe0003a76f47c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f47c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76f47c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f47c, SpinLock_unk_out = 0xffffe0003a76f47c, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f47c, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76f47c
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f47c, SpinLock_unk_out = 0xffffe0003a76f47c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f47c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76f47c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76f47c, SpinLock_unk_out = 0xffffe0003a76f47c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76f47c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76f47c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a43dc, SpinLock_unk_out = 0xffffe0003a7a43dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a43dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7a43dc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a43dc, SpinLock_unk_out = 0xffffe0003a7a43dc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a43dc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7a43dc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a43dc, SpinLock_unk_out = 0xffffe0003a7a43dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a43dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7a43dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a43dc, SpinLock_unk_out = 0xffffe0003a7a43dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a43dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7a43dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76eb5c, SpinLock_unk_out = 0xffffe0003a76eb5c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76eb5c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76eb5c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76eb5c, SpinLock_unk_out = 0xffffe0003a76eb5c, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76eb5c, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76eb5c
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x81, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7824c0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76eb5c, SpinLock_unk_out = 0xffffe0003a76eb5c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76eb5c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76eb5c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76eb5c, SpinLock_unk_out = 0xffffe0003a76eb5c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76eb5c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76eb5c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a45bc, SpinLock_unk_out = 0xffffe0003a7a45bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a45bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7a45bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a45bc, SpinLock_unk_out = 0xffffe0003a7a45bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a45bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7a45bc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x81, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7873e0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a45bc, SpinLock_unk_out = 0xffffe0003a7a45bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a45bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7a45bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a45bc, SpinLock_unk_out = 0xffffe0003a7a45bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a45bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7a45bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e79c, SpinLock_unk_out = 0xffffe0003a76e79c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e79c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76e79c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e79c, SpinLock_unk_out = 0xffffe0003a76e79c, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e79c, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76e79c
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x81, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77caf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e79c, SpinLock_unk_out = 0xffffe0003a76e79c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e79c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76e79c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e79c, SpinLock_unk_out = 0xffffe0003a76e79c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e79c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76e79c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7866dc, SpinLock_unk_out = 0xffffe0003a7866dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7866dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7866dc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7866dc, SpinLock_unk_out = 0xffffe0003a7866dc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7866dc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7866dc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x81, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77ca50
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7866dc, SpinLock_unk_out = 0xffffe0003a7866dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7866dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7866dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7866dc, SpinLock_unk_out = 0xffffe0003a7866dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7866dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7866dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e97c, SpinLock_unk_out = 0xffffe0003a76e97c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e97c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76e97c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e97c, SpinLock_unk_out = 0xffffe0003a76e97c, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e97c, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76e97c
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x81, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77c9b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e97c, SpinLock_unk_out = 0xffffe0003a76e97c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e97c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76e97c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76e97c, SpinLock_unk_out = 0xffffe0003a76e97c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76e97c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76e97c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a779fe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a779fe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a779fe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766fe4, SpinLock_unk_out = 0xffffe0003a766fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766fe4, SpinLock_unk_out = 0xffffe0003a766fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766fe4, SpinLock_unk_out = 0xffffe0003a766fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766fe4, SpinLock_unk_out = 0xffffe0003a766fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766fe4, SpinLock_unk_out = 0xffffe0003a766fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76efe4, SpinLock_unk_out = 0xffffe0003a76efe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76efe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76efe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76efe4, SpinLock_unk_out = 0xffffe0003a76efe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76efe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76efe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76efe4, SpinLock_unk_out = 0xffffe0003a76efe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76efe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76efe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76efe4, SpinLock_unk_out = 0xffffe0003a76efe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76efe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76efe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76efe4, SpinLock_unk_out = 0xffffe0003a76efe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76efe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76efe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766b64, SpinLock_unk_out = 0xffffe0003a766b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766b64, SpinLock_unk_out = 0xffffe0003a766b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766b64, SpinLock_unk_out = 0xffffe0003a766b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766b64, SpinLock_unk_out = 0xffffe0003a766b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766b64, SpinLock_unk_out = 0xffffe0003a766b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786b64, SpinLock_unk_out = 0xffffe0003a786b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786b64, SpinLock_unk_out = 0xffffe0003a786b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786b64, SpinLock_unk_out = 0xffffe0003a786b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786b64, SpinLock_unk_out = 0xffffe0003a786b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786b64, SpinLock_unk_out = 0xffffe0003a786b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634fe4, SpinLock_unk_out = 0xffffe0003c634fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634fe4, SpinLock_unk_out = 0xffffe0003c634fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634fe4, SpinLock_unk_out = 0xffffe0003c634fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634fe4, SpinLock_unk_out = 0xffffe0003c634fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634fe4, SpinLock_unk_out = 0xffffe0003c634fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786fe4, SpinLock_unk_out = 0xffffe0003a786fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786fe4, SpinLock_unk_out = 0xffffe0003a786fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786fe4, SpinLock_unk_out = 0xffffe0003a786fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786fe4, SpinLock_unk_out = 0xffffe0003a786fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a786fe4, SpinLock_unk_out = 0xffffe0003a786fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a786fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a786fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003c634b64
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003c634b64
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003c634b64
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7b6464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7b6464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7b6464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6346dc, SpinLock_unk_out = 0xffffe0003c6346dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6346dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c6346dc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6346dc, SpinLock_unk_out = 0xffffe0003c6346dc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6346dc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003c6346dc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6346dc, SpinLock_unk_out = 0xffffe0003c6346dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6346dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c6346dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6346dc, SpinLock_unk_out = 0xffffe0003c6346dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6346dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c6346dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6344fc, SpinLock_unk_out = 0xffffe0003c6344fc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6344fc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c6344fc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6344fc, SpinLock_unk_out = 0xffffe0003c6344fc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6344fc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003c6344fc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6344fc, SpinLock_unk_out = 0xffffe0003c6344fc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6344fc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c6344fc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6344fc, SpinLock_unk_out = 0xffffe0003c6344fc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6344fc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c6344fc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b66dc, SpinLock_unk_out = 0xffffe0003a7b66dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b66dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b66dc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b66dc, SpinLock_unk_out = 0xffffe0003a7b66dc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b66dc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7b66dc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b66dc, SpinLock_unk_out = 0xffffe0003a7b66dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b66dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b66dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b66dc, SpinLock_unk_out = 0xffffe0003a7b66dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b66dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b66dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e42c, SpinLock_unk_out = 0xffffe0003a77e42c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e42c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e42c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ed250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e42c, SpinLock_unk_out = 0xffffe0003a77e42c, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e42c, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e42c
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e42c, SpinLock_unk_out = 0xffffe0003a77e42c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e42c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e42c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e42c, SpinLock_unk_out = 0xffffe0003a77e42c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e42c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e42c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6fe4, SpinLock_unk_out = 0xffffe0003a7b6fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6fe4, SpinLock_unk_out = 0xffffe0003a7b6fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6fe4, SpinLock_unk_out = 0xffffe0003a7b6fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6fe4, SpinLock_unk_out = 0xffffe0003a7b6fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6fe4, SpinLock_unk_out = 0xffffe0003a7b6fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6b64, SpinLock_unk_out = 0xffffe0003a7b6b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6b64, SpinLock_unk_out = 0xffffe0003a7b6b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6b64, SpinLock_unk_out = 0xffffe0003a7b6b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6b64, SpinLock_unk_out = 0xffffe0003a7b6b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6b64, SpinLock_unk_out = 0xffffe0003a7b6b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1464, SpinLock_unk_out = 0xffffe0003a7b1464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1464, SpinLock_unk_out = 0xffffe0003a7b1464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1464, SpinLock_unk_out = 0xffffe0003a7b1464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1464, SpinLock_unk_out = 0xffffe0003a7b1464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1464, SpinLock_unk_out = 0xffffe0003a7b1464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77cfe4, SpinLock_unk_out = 0xffffe0003a77cfe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77cfe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77cfe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77cfe4, SpinLock_unk_out = 0xffffe0003a77cfe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77cfe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77cfe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77cfe4, SpinLock_unk_out = 0xffffe0003a77cfe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77cfe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77cfe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77cfe4, SpinLock_unk_out = 0xffffe0003a77cfe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77cfe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77cfe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77cfe4, SpinLock_unk_out = 0xffffe0003a77cfe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77cfe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77cfe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5eceb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d5ece20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0

Kernel Graph 4

Kernel Graph

Kernel Graph Legend
Code Block #8 (EP #4, #5, #6, #7, #36, #99, #35, #37, #50, #64, #173, #85, #106, #100, #150, #151, #159, #165, #163, #164, #169, #170)
»
Information Value
Trigger CmpCallCallBacks+0x3ab
Start Address 0xfffff800fc2cb560
Execution Path #4 (length: 3, count: 55198, processes: 37)
»
Information Value
Sequence Length 3
Processes
»
Process Count
Process 18 (sppsvc.exe, PID: 3908) 352
Process 26 (lsass.exe, PID: 540) 2435
Process 1 (pvdnlz.exe, PID: 2280) 9
Process 4 (svchost.exe, PID: 628) 2391
Process 9 (svchost.exe, PID: 972) 168
Process 12 (svchost.exe, PID: 1052) 15
Process 30 (explorer.exe, PID: 1184) 4552
Process 7 (svchost.exe, PID: 888) 2617
Process 20 (svchost.exe, PID: 3092) 19
Process 14 (svchost.exe, PID: 1296) 6
Process 10 (svchost.exe, PID: 1000) 6573
Process 42 (iexplore.exe, PID: 556) 1387
Process 36 (wmiadap.exe, PID: 3776) 2554
Process 110 (dllhost.exe, PID: 2832) 12
Process 11 (svchost.exe, PID: 324) 3768
Process 44 (hxtsr.exe, PID: 3844) 205
Process 15 (svchost.exe, PID: 1560) 165
Process 31 (taskhostw.exe, PID: 1636) 1283
Process 24 (csrss.exe, PID: 456) 59
Process 3 (services.exe, PID: 532) 642
Process 111 (dllhost.exe, PID: 4116) 1005
Process 5 (svchost.exe, PID: 660) 1393
Process 16 (officeclicktorun.exe, PID: 1740) 224
Process 108 (UNKNOWN, PID: UNKNOWN) 21
Process 107 (msfeedssync.exe, PID: 4172) 3302
Process 32 (runtimebroker.exe, PID: 2168) 109
Process 37 (taskhostw.exe, PID: 3804) 98
Process 28 (sihost.exe, PID: 1432) 4170
Process 2 (System, PID: 4) 69
Process 25 (winlogon.exe, PID: 508) 14001
Process 22 (csrss.exe, PID: 372) 4
Process 114 (mpcmdrun.exe, PID: 4164) 435
Process 116 (UNKNOWN, PID: UNKNOWN) 387
Process 27 (dwm.exe, PID: 784) 30
Process 6 (svchost.exe, PID: 860) 539
Process 17 (svchost.exe, PID: 3128) 188
Process 104 (wmiprvse.exe, PID: 3620) 11
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe000412b8840
PsGetProcessImageFileName ret_val_out = 0xffffe000412b8c90
_stricmp _Str1 = sppsvc.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #5 (length: 16, count: 79, processes: 12)
»
Information Value
Sequence Length 16
Processes
»
Process Count
Process 18 (sppsvc.exe, PID: 3908) 2
Process 30 (explorer.exe, PID: 1184) 12
Process 10 (svchost.exe, PID: 1000) 32
Process 107 (msfeedssync.exe, PID: 4172) 4
Process 9 (svchost.exe, PID: 972) 2
Process 26 (lsass.exe, PID: 540) 10
Process 42 (iexplore.exe, PID: 556) 2
Process 2 (System, PID: 4) 2
Process 3 (services.exe, PID: 532) 2
Process 31 (taskhostw.exe, PID: 1636) 6
Process 11 (svchost.exe, PID: 324) 4
Process 36 (wmiadap.exe, PID: 3776) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe000412b8840
PsGetProcessImageFileName ret_val_out = 0xffffe000412b8c90
_stricmp _Str1 = sppsvc.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbab90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbab90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c0ef0d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa2, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbab90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbab90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c0eedb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa0, ret_val_ptr_out = 0xffffe0003af83ef0
ObQueryNameString Object_ptr = 0xffffc000b9fbab90, Length = 0xa0, ObjectNameInfo_unk_out = 0xffffe0003af83ef0, ReturnLength_ptr_out = 0xffffd0002c0eedb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\WPA\8DEC0AF1-0341-4b93-85CD-72606C2DF94C-7P-20, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\WPA\8DEC0AF1-0341-4b93-85CD-72606C2DF94C-7P-20
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x2, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = , _String2 = ImagePath, ret_val_out = -105
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
Execution Path #6 (length: 14, count: 5760, processes: 33)
»
Information Value
Sequence Length 14
Processes
»
Process Count
Process 26 (lsass.exe, PID: 540) 505
Process 1 (pvdnlz.exe, PID: 2280) 1
Process 4 (svchost.exe, PID: 628) 258
Process 9 (svchost.exe, PID: 972) 13
Process 12 (svchost.exe, PID: 1052) 3
Process 7 (svchost.exe, PID: 888) 77
Process 10 (svchost.exe, PID: 1000) 761
Process 36 (wmiadap.exe, PID: 3776) 1798
Process 11 (svchost.exe, PID: 324) 364
Process 20 (svchost.exe, PID: 3092) 1
Process 15 (svchost.exe, PID: 1560) 33
Process 44 (hxtsr.exe, PID: 3844) 25
Process 111 (dllhost.exe, PID: 4116) 104
Process 5 (svchost.exe, PID: 660) 139
Process 16 (officeclicktorun.exe, PID: 1740) 25
Process 108 (UNKNOWN, PID: UNKNOWN) 1
Process 107 (msfeedssync.exe, PID: 4172) 464
Process 32 (runtimebroker.exe, PID: 2168) 31
Process 42 (iexplore.exe, PID: 556) 219
Process 30 (explorer.exe, PID: 1184) 351
Process 18 (sppsvc.exe, PID: 3908) 21
Process 28 (sihost.exe, PID: 1432) 39
Process 37 (taskhostw.exe, PID: 3804) 2
Process 24 (csrss.exe, PID: 456) 7
Process 2 (System, PID: 4) 37
Process 22 (csrss.exe, PID: 372) 4
Process 116 (UNKNOWN, PID: UNKNOWN) 32
Process 114 (mpcmdrun.exe, PID: 4164) 41
Process 3 (services.exe, PID: 532) 266
Process 6 (svchost.exe, PID: 860) 127
Process 27 (dwm.exe, PID: 784) 2
Process 17 (svchost.exe, PID: 3128) 8
Process 104 (wmiprvse.exe, PID: 3620) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc6d840
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc6dc90
_stricmp _Str1 = lsass.exe, _Str2 = winlogon.exe, ret_val_out = -11
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba3f1b90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba3f1b90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c311fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba3f1b90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba3f1b90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c311c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = * (e.g. 0xffffc000ba3f1b90), Length = * (e.g. 0xf6), ObjectNameInfo_unk_out = * (e.g. 0xffffe0003af8ff00), ReturnLength_ptr_out = * (e.g. 0xffffd0002c311c98), ret_val_out = * (e.g. 0x0)
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
Execution Path #7 (length: 15, count: 1446, processes: 17)
»
Information Value
Sequence Length 15
Processes
»
Process Count
Process 9 (svchost.exe, PID: 972) 3
Process 42 (iexplore.exe, PID: 556) 20
Process 4 (svchost.exe, PID: 628) 53
Process 31 (taskhostw.exe, PID: 1636) 415
Process 111 (dllhost.exe, PID: 4116) 3
Process 16 (officeclicktorun.exe, PID: 1740) 5
Process 107 (msfeedssync.exe, PID: 4172) 68
Process 28 (sihost.exe, PID: 1432) 606
Process 10 (svchost.exe, PID: 1000) 10
Process 30 (explorer.exe, PID: 1184) 194
Process 7 (svchost.exe, PID: 888) 1
Process 116 (UNKNOWN, PID: UNKNOWN) 49
Process 114 (mpcmdrun.exe, PID: 4164) 2
Process 27 (dwm.exe, PID: 784) 6
Process 17 (svchost.exe, PID: 3128) 6
Process 11 (svchost.exe, PID: 324) 4
Process 18 (sppsvc.exe, PID: 3908) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b81a6470, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b81a6470, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002a3b9fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe8, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b81a6470, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b81a6470, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002a3b9c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe6, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b81a6470, Length = 0xe6, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002a3b9c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-a0-f9-99-47-25, DestinationString_out = \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-a0-f9-99-47-25
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-a0-f9-99-47-25, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
Execution Path #36 (length: 2102, count: 1, processes: 1)
»
Information Value
Sequence Length 2102
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 1
Sequence
»
Symbol Parameters
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fc790, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0fc790, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{e6835967-e0d2-41fb-bcec-58387404e25a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11e, ret_val_ptr_out = 0xffffe0003a769db0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0f8660, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x11c, ret_val_ptr_out = 0xffffe0003a7879d0
ObQueryNameString Object_ptr = 0xffffc000ba0f8660, Length = 0x11c, ObjectNameInfo_unk_out = 0xffffe0003a7879d0, ReturnLength_ptr_out = 0xffffd0002f3b2c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-BackgroundTaskInfrastructure/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a769db0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
For performance reasons, the remaining entries are omitted.
Click to download all entries as text file.
Execution Path #99 (length: 58, count: 1, processes: 1)
»
Information Value
Sequence Length 58
Processes
»
Process Count
Process 11 (svchost.exe, PID: 324) 1
Sequence
»
Symbol Parameters
ObQueryNameString Object_ptr = 0xffffc000b90ded40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ae4efb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90ded40, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90ded40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ae4ec98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b90ded40, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd0002ae4ec98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Cpv
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4a6080
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4a64d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #35 (length: 17, count: 1, processes: 1)
»
Information Value
Sequence Length 17
Processes
»
Process Count
Process 28 (sihost.exe, PID: 1432) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf6f840
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf6fc90
_stricmp _Str1 = sihost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf6f840
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf6fc90
_stricmp _Str1 = sihost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f25afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xec, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f25ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xea, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0xea, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002f25ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\A\{C4623AC2-A839-4F8E-B441-AFF5C080B156}\Server\CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca, DestinationString_out = \REGISTRY\A\{C4623AC2-A839-4F8E-B441-AFF5C080B156}\Server\CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\A\{C4, ret_val_out = 20
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
Execution Path #37 (length: 13, count: 3, processes: 1)
»
Information Value
Sequence Length 13
Processes
»
Process Count
Process 36 (wmiadap.exe, PID: 3776) 3
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
Execution Path #50 (length: 18, count: 2, processes: 2)
»
Information Value
Sequence Length 18
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Process 112 (backgroundtaskhost.exe, PID: 3212) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
Execution Path #64 (length: 2, count: 16, processes: 2)
»
Information Value
Sequence Length 2
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 15
Process 10 (svchost.exe, PID: 1000) 1
Sequence
»
Symbol Parameters
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
Execution Path #173 (length: 260, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 260
Processes
»
Process Count
Process 42 (iexplore.exe, PID: 556) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0d73f0, ret_val_out = 1
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9c, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0d73f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0d73f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9a, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000ba0d73f0, Length = 0x9a, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba370400, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba370400, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe2, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba370400, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba370400, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe0, ret_val_ptr_out = 0xffffe0003a76faa0
ObQueryNameString Object_ptr = 0xffffc000ba370400, Length = 0xe0, ObjectNameInfo_unk_out = 0xffffe0003a76faa0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Main, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Main
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Internet Explorer\Main, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -14
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba3533f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba3533f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8a, ret_val_ptr_out = 0xffffe0003a7824c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba3533f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba3533f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x88, ret_val_ptr_out = 0xffffe0003a7873e0
ObQueryNameString Object_ptr = 0xffffc000ba3533f0, Length = 0x88, ObjectNameInfo_unk_out = 0xffffe0003a7873e0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main
ExFreePoolWithTag P_ptr = 0xffffe0003a7873e0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7824c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba27e8e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba27e8e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba27e8e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba27e8e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000ba27e8e0, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\OLE\Extensions, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\OLE\Extensions
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0d73f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0d73f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9c, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0d73f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0d73f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9a, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000ba0d73f0, Length = 0x9a, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba370400, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba370400, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe2, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba370400, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba370400, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe0, ret_val_ptr_out = 0xffffe0003a76faa0
ObQueryNameString Object_ptr = 0xffffc000ba370400, Length = 0xe0, ObjectNameInfo_unk_out = 0xffffe0003a76faa0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Main, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Main
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Internet Explorer\Main, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -14
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba3533f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba3533f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8a, ret_val_ptr_out = 0xffffe0003a77c910
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba3533f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba3533f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x88, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000ba3533f0, Length = 0x88, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a77c910, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b81a6470, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b81a6470, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b81a6470, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b81a6470, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b81a6470, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\OLE\Extensions, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\OLE\Extensions
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0d73f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0d73f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9c, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0d73f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0d73f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9a, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000ba0d73f0, Length = 0x9a, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba370400, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba370400, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe2, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba370400, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba370400, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe0, ret_val_ptr_out = 0xffffe0003a76faa0
ObQueryNameString Object_ptr = 0xffffc000ba370400, Length = 0xe0, ObjectNameInfo_unk_out = 0xffffe0003a76faa0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Main, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Main
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Internet Explorer\Main, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -14
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba3533f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba3533f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8a, ret_val_ptr_out = 0xffffe0003a77c910
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba3533f0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba3533f0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x88, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000ba3533f0, Length = 0x88, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a77c910, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8dfbe40, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8dfbe40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8dfbe40, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8dfbe40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b8dfbe40, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd0002cf5ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\OLE\Extensions, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\OLE\Extensions
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
Execution Path #85 (length: 2, count: 1, processes: 1)
»
Information Value
Sequence Length 2
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
Execution Path #106 (length: 35, count: 2, processes: 1)
»
Information Value
Sequence Length 35
Processes
»
Process Count
Process 42 (iexplore.exe, PID: 556) 2
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8d16e80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8d16e80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029c7fa38, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8d16e80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8d16e80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029c7f718, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b8d16e80, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd00029c7f718, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\OLE\Extensions, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\OLE\Extensions
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf66080
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf664d0
_stricmp _Str1 = iexplore.exe, _Str2 = winlogon.exe, ret_val_out = -14
Execution Path #100 (length: 13, count: 2, processes: 2)
»
Information Value
Sequence Length 13
Processes
»
Process Count
Process 36 (wmiadap.exe, PID: 3776) 1
Process 10 (svchost.exe, PID: 1000) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8d16e80, ret_val_out = 1
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8d16e80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8d16e80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8d16e80, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
Execution Path #150 (length: 10, count: 3, processes: 2)
»
Information Value
Sequence Length 10
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 2
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002b8bafb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x116, ret_val_ptr_out = 0xffffe0003a7879d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002b8bac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x114, ret_val_ptr_out = 0xffffe0003a769ee0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x114, ObjectNameInfo_unk_out = 0xffffe0003a769ee0, ReturnLength_ptr_out = 0xffffd0002b8bac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Diagnostics-Performance/Operational, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Diagnostics-Performance/Operational
ExFreePoolWithTag P_ptr = 0xffffe0003a769ee0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
Execution Path #151 (length: 11, count: 125, processes: 2)
»
Information Value
Sequence Length 11
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 62
Process 107 (msfeedssync.exe, PID: 4172) 63
Sequence
»
Symbol Parameters
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8d4f800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8d4f800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002b8bafb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x114, ret_val_ptr_out = 0xffffe0003a7879d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8d4f800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8d4f800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002b8bac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x112, ret_val_ptr_out = 0xffffe0003a769ee0
ObQueryNameString Object_ptr = 0xffffc000b8d4f800, Length = 0x112, ObjectNameInfo_unk_out = 0xffffe0003a769ee0, ReturnLength_ptr_out = 0xffffd0002b8bac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Diagnostics-Performance/Diagnostic, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Diagnostics-Performance/Diagnostic
ExFreePoolWithTag P_ptr = 0xffffe0003a769ee0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
Execution Path #159 (length: 2, count: 1, processes: 1)
»
Information Value
Sequence Length 2
Processes
»
Process Count
Process 28 (sihost.exe, PID: 1432) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bf6f840
PsGetProcessImageFileName ret_val_out = 0xffffe0003bf6fc90
Execution Path #165 (length: 4324, count: 1, processes: 1)
»
Information Value
Sequence Length 4324
Processes
»
Process Count
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x106, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b90b9460, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b90b9460, Length = 0x104, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b99fd650, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b99fd650, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fb7760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9a, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fb7760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x98, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x98, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fb7760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9a, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fb7760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x98, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x98, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fb7760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9a, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fb7760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x98, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x98, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fb7760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9a, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fb7760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x98, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b9fb7760, Length = 0x98, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2d7cf0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2d7cf0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbc, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0xbc, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2d7cf0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2d7cf0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbc, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0xbc, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2d7cf0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2d7cf0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbc, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0xbc, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2d7cf0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba2d7cf0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbc, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000ba2d7cf0, Length = 0xbc, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000001, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000001
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000001, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000001
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000002, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000002
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000002, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000002
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000003, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000003
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000003, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000003
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000004, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000004
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000004, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000004
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000005, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000005
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60ffb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfc, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b88746d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b88746d0, Length = 0xfa, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002f60fc98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000005, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000005
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
For performance reasons, the remaining entries are omitted.
Click to download all entries as text file.
Execution Path #163 (length: 50, count: 1, processes: 1)
»
Information Value
Sequence Length 50
Processes
»
Process Count
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
ObQueryNameString Object_ptr = 0xffffc000b78a39c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf4, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78a39c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78a39c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b78a39c0, Length = 0xf2, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs\27748148BBE67A43CDBFEC6C3784862CE134E6EA, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs\27748148BBE67A43CDBFEC6C3784862CE134E6EA
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78a39c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78a39c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf4, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78a39c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78a39c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b78a39c0, Length = 0xf2, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs\27748148BBE67A43CDBFEC6C3784862CE134E6EA, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs\27748148BBE67A43CDBFEC6C3784862CE134E6EA
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78a39c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78a39c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf4, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78a39c0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78a39c0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b78a39c0, Length = 0xf2, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs\27748148BBE67A43CDBFEC6C3784862CE134E6EA, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs\27748148BBE67A43CDBFEC6C3784862CE134E6EA
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
Execution Path #164 (length: 12, count: 1, processes: 1)
»
Information Value
Sequence Length 12
Processes
»
Process Count
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba098760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba098760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba098760, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba098760, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000ba098760, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\SystemCertificates\Root\ProtectedRoots, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\SystemCertificates\Root\ProtectedRoots
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\SystemCertificates\Root\ProtectedRoots, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -4
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
Execution Path #169 (length: 13, count: 1, processes: 1)
»
Information Value
Sequence Length 13
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 1
Sequence
»
Symbol Parameters
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b902c530, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b902c530, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002a9b9fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b902c530, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b902c530, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002a9b9c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b902c530, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002a9b9c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
Execution Path #170 (length: 1425, count: 1, processes: 1)
»
Information Value
Sequence Length 1425
Processes
»
Process Count
Process 36 (wmiadap.exe, PID: 3776) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x72, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8de98e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x70, ret_val_ptr_out = 0xffffe0003c634270
ObQueryNameString Object_ptr = 0xffffc000b8de98e0, Length = 0x70, ObjectNameInfo_unk_out = 0xffffe0003c634270, ReturnLength_ptr_out = 0xffffd00029867c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\WBEM\CIMOM
ExFreePoolWithTag P_ptr = 0xffffe0003c634270, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c367080
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3674d0
_stricmp _Str1 = WMIADAP.exe, _Str2 = winlogon.exe, ret_val_out = 4
For performance reasons, the remaining entries are omitted.
Click to download all entries as text file.

Kernel Graph 5

Kernel Graph

Kernel Graph Legend
Code Block #9 (EP #8)
»
Information Value
Trigger Iru.sys+0x2bc44a
Start Address 0xfffff80041742380
Execution Path #8 (length: 1, count: 28, processes: 9)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 9 (svchost.exe, PID: 972) 2
Process 12 (svchost.exe, PID: 1052) 1
Process 7 (svchost.exe, PID: 888) 2
Process 16 (officeclicktorun.exe, PID: 1740) 6
Process 2 (System, PID: 4) 3
Process 25 (winlogon.exe, PID: 508) 5
Process 10 (svchost.exe, PID: 1000) 5
Process 42 (iexplore.exe, PID: 556) 1
Process 107 (msfeedssync.exe, PID: 4172) 3
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540

Kernel Graph 6

Kernel Graph

Kernel Graph Legend
Code Block #10 (EP #9)
»
Information Value
Trigger Iru.sys+0x2b21d5
Start Address 0xfffff8004175b774
Execution Path #9 (length: 1, count: 25, processes: 9)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 9 (svchost.exe, PID: 972) 2
Process 12 (svchost.exe, PID: 1052) 1
Process 7 (svchost.exe, PID: 888) 2
Process 16 (officeclicktorun.exe, PID: 1740) 6
Process 2 (System, PID: 4) 3
Process 25 (winlogon.exe, PID: 508) 2
Process 10 (svchost.exe, PID: 1000) 5
Process 42 (iexplore.exe, PID: 556) 1
Process 107 (msfeedssync.exe, PID: 4172) 3
Sequence
»
Symbol Parameters
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990

Kernel Graph 7

Kernel Graph

Kernel Graph Legend
Code Block #11 (EP #10)
»
Information Value
Trigger Iru.sys+0x2c9800
Start Address 0xfffff800417b6104
Execution Path #10 (length: 1, count: 26, processes: 9)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 9 (svchost.exe, PID: 972) 2
Process 12 (svchost.exe, PID: 1052) 1
Process 7 (svchost.exe, PID: 888) 2
Process 16 (officeclicktorun.exe, PID: 1740) 6
Process 2 (System, PID: 4) 3
Process 25 (winlogon.exe, PID: 508) 3
Process 10 (svchost.exe, PID: 1000) 5
Process 42 (iexplore.exe, PID: 556) 1
Process 107 (msfeedssync.exe, PID: 4172) 3
Sequence
»
Symbol Parameters
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4

Kernel Graph 8

Kernel Graph

Kernel Graph Legend
Code Block #12 (EP #57, #180, #23, #181, #155, #46, #162, #51, #52, #182, #152, #148, #188, #153, #156, #158, #157, #189, #190, #161, #192, #168, #196)
»
Information Value
Trigger Iru.sys+0x1bbbf
Start Address 0xfffff80041a719c0
Execution Path #57 (length: 8, count: 1, processes: 1)
»
Information Value
Sequence Length 8
Processes
»
Process Count
Process 9 (svchost.exe, PID: 972) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #180 (length: 573, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 573
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9099780, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9099780, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8e, ret_val_ptr_out = 0xffffe0003af95ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9099780, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9099780, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8c, ret_val_ptr_out = 0xffffe0003a763d70
ObQueryNameString Object_ptr = 0xffffc000b9099780, Length = 0x8c, ObjectNameInfo_unk_out = 0xffffe0003a763d70, ReturnLength_ptr_out = 0xffffd0002d562c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NetBT\Linkage, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NetBT\Linkage
ExFreePoolWithTag P_ptr = 0xffffe0003a763d70, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af95ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9099780, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9099780, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8e, ret_val_ptr_out = 0xffffe0003af95ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9099780, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9099780, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8c, ret_val_ptr_out = 0xffffe0003a763d70
ObQueryNameString Object_ptr = 0xffffc000b9099780, Length = 0x8c, ObjectNameInfo_unk_out = 0xffffe0003a763d70, ReturnLength_ptr_out = 0xffffd0002d562c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NetBT\Linkage, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NetBT\Linkage
ExFreePoolWithTag P_ptr = 0xffffe0003a763d70, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af95ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9099780, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9099780, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8e, ret_val_ptr_out = 0xffffe0003af95ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9099780, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9099780, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8c, ret_val_ptr_out = 0xffffe0003a763d70
ObQueryNameString Object_ptr = 0xffffc000b9099780, Length = 0x8c, ObjectNameInfo_unk_out = 0xffffe0003a763d70, ReturnLength_ptr_out = 0xffffd0002d562c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NetBT\Linkage, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NetBT\Linkage
ExFreePoolWithTag P_ptr = 0xffffe0003a763d70, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af95ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80000cac, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cac, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cac, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000cac, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47fff
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a763a6c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461ff680
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003b4669f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461ff680, MemoryDescriptorList_unk_out = 0xffffe000461ff680
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003b4669f0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b4669f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x60, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af83fa0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe000461ff680
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80000bbc, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000bbc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000bbc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000bbc, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffe
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76618c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461ff680
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003b4669f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461ff680, MemoryDescriptorList_unk_out = 0xffffe000461ff680
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003b4669f0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b4669f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x60, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a786250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe000461ff680
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c62d010, Irp_unk_out = 0xffffe0003c62d010, ret_val_out = 0x103
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80000a60, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000a60, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000a60, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000a60, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffe
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76fd0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461ff680
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003b79bad0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461ff680, MemoryDescriptorList_unk_out = 0xffffe000461ff680
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003b79bad0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b79bad0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe000461ff680
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80000cac, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cac, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cac, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000cac, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffd
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a769aac, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000461ff680
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003b79bad0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000461ff680, MemoryDescriptorList_unk_out = 0xffffe000461ff680
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003b79bad0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b79bad0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe000461ff680
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b6a3640, Irp_unk_out = 0xffffe0003b6a3640, ret_val_out = 0x103
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80000f98, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000f98, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000f98, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000f98, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffc
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76618c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c251f40
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003c8359e0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c251f40, MemoryDescriptorList_unk_out = 0xffffe0003c251f40
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003c8359e0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c8359e0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c251f40
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80000ff0, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000ff0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000ff0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000ff0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffb
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76fd0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c251f40
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003c8359e0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c251f40, MemoryDescriptorList_unk_out = 0xffffe0003c251f40
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003c8359e0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c8359e0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c251f40
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b6c9d90
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80001060, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001060, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001060, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80001060, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffc
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a7b1d0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f1250
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003b79bad0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f1250, MemoryDescriptorList_unk_out = 0xffffe0003c1f1250
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003b79bad0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b79bad0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c1f1250
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a779b90
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80000ffc, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000ffc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000ffc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000ffc, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffb
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a779d0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f1250
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003b79bad0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f1250, MemoryDescriptorList_unk_out = 0xffffe0003c1f1250
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003b79bad0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b79bad0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c1f1250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003a765a50, Irp_unk_out = 0xffffe0003a765a50, ret_val_out = 0x103
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80001074, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001074, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001074, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80001074, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47fee
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003c63488c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003f9b4870
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003c84dcf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003f9b4870, MemoryDescriptorList_unk_out = 0xffffe0003f9b4870
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003c84dcf0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c84dcf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003f9b4870
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80001028, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001028, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001028, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80001028, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47fed
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a7b618c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003f9b4870
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003c84dcf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003f9b4870, MemoryDescriptorList_unk_out = 0xffffe0003f9b4870
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003c84dcf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c84dcf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003f9b4870
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c62d010, Irp_unk_out = 0xffffe0003c62d010, ret_val_out = 0x103
Execution Path #23 (length: 21, count: 1, processes: 1)
»
Information Value
Sequence Length 21
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #181 (length: 805, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 805
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8cabfa0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8cabfa0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8cabfa0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8cabfa0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b8cabfa0, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002aa70c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7d55080, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7d55080, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7d55080, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7d55080, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7d55080, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002aa70c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0c0c20, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0c0c20, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0c0c20, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0c0c20, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0c0c20, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002aa70c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7d55080, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7d55080, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7d55080, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7d55080, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7d55080, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002aa70c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b6a78a30, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b6a78a30, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa710d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b6a78a30, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b6a78a30, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70db8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b6a78a30, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002aa70db8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x2a, ret_val_ptr_out = 0xffffe0003af83eb0
_wcsicmp _String1 = DhcpInterfaceOptions, _String2 = ImagePath, ret_val_out = -5
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af83eb0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #155 (length: 2733, count: 1, processes: 1)
»
Information Value
Sequence Length 2733
Processes
»
Process Count
Process 16 (officeclicktorun.exe, PID: 1740) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78fea90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78fea90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78fea90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78fea90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa2, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b78fea90, Length = 0xa2, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\Common\ClientTelemetry, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78fea90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78fea90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78fea90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78fea90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa2, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b78fea90, Length = 0xa2, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\Common\ClientTelemetry, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7bd5a40, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7bd5a40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7bd5a40, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7bd5a40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b7bd5a40, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfa, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf8, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{e25a642b-6ceb-4194-8f83-8bc82af94f5a}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{e25a642b-6ceb-4194-8f83-8bc82af94f5a}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91b5770, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b91b5770, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{c20d55b1-6c9d-11eb-b0a3-806e6f6e6963}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7ad7080, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7ad7080, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc0, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7ad7080, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7ad7080, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000b7ad7080, Length = 0xbe, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9ce0960, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9ce0960, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd2, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9ce0960, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9ce0960, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd0, ret_val_ptr_out = 0xffffe0003a782f30
ObQueryNameString Object_ptr = 0xffffc000b9ce0960, Length = 0xd0, ObjectNameInfo_unk_out = 0xffffe0003a782f30, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
ExFreePoolWithTag P_ptr = 0xffffe0003a782f30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9ce0960, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9ce0960, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd2, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9ce0960, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9ce0960, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd0, ret_val_ptr_out = 0xffffe0003a782f30
ObQueryNameString Object_ptr = 0xffffc000b9ce0960, Length = 0xd0, ObjectNameInfo_unk_out = 0xffffe0003a782f30, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
ExFreePoolWithTag P_ptr = 0xffffe0003a782f30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8a0c6d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8a0c6d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa0, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8a0c6d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8a0c6d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9e, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b8a0c6d0, Length = 0x9e, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\Internet, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\Internet
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\Internet, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8a0c6d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8a0c6d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa0, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8a0c6d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8a0c6d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9e, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b8a0c6d0, Length = 0x9e, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\Internet, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\Internet
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\Internet, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7e35610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7e35610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7e35610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7e35610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x90, ret_val_ptr_out = 0xffffe0003af95ec0
ObQueryNameString Object_ptr = 0xffffc000b7e35610, Length = 0x90, ObjectNameInfo_unk_out = 0xffffe0003af95ec0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security
ExFreePoolWithTag P_ptr = 0xffffe0003af95ec0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003be6f490, Irp_unk_out = 0xffffe0003be6f490, ret_val_out = 0x103
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xda, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8b2eae0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b8b2eae0, Length = 0xd8, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
For performance reasons, the remaining entries are omitted.
Click to download all entries as text file.
Execution Path #46 (length: 51, count: 1, processes: 1)
»
Information Value
Sequence Length 51
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d296eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x60, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7872f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d296eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x60, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a787280
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x103
Execution Path #162 (length: 42, count: 1, processes: 1)
»
Information Value
Sequence Length 42
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b6d0080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b6d04d0
_stricmp _Str1 = cmd.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b6d0080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b6d04d0
_stricmp _Str1 = cmd.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b6d0080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b6d04d0
_stricmp _Str1 = cmd.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b6d0080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b6d04d0
_stricmp _Str1 = cmd.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b6d0080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b6d04d0
_stricmp _Str1 = cmd.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003b6d0080
PsGetProcessImageFileName ret_val_out = 0xffffe0003b6d04d0
_stricmp _Str1 = cmd.exe, _Str2 = winlogon.exe, ret_val_out = -20
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7858ac, SpinLock_unk_out = 0xffffe0003a7858ac, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7858ac, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7858ac
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
Execution Path #51 (length: 726, count: 1, processes: 1)
»
Information Value
Sequence Length 726
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
Execution Path #52 (length: 15, count: 1, processes: 1)
»
Information Value
Sequence Length 15
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
Execution Path #182 (length: 51, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 51
Processes
»
Process Count
Process 9 (svchost.exe, PID: 972) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a458540
PsGetProcessImageFileName ret_val_out = 0xffffe0003a458990
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #152 (length: 9, count: 3, processes: 3)
»
Information Value
Sequence Length 9
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 1
Process 30 (explorer.exe, PID: 1184) 1
Process 42 (iexplore.exe, PID: 556) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #148 (length: 33, count: 2, processes: 1)
»
Information Value
Sequence Length 33
Processes
»
Process Count
Process 16 (officeclicktorun.exe, PID: 1740) 2
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
Execution Path #188 (length: 11812, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 11812
Processes
»
Process Count
Process 16 (officeclicktorun.exe, PID: 1740) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xaa, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa8, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0xa8, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763f10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763f10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbf610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x84, ret_val_ptr_out = 0xffffe0003a77c910
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbf610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x82, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x82, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a77c910, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba1f8de0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba1f8de0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbf610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x84, ret_val_ptr_out = 0xffffe0003a77c910
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbf610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x82, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x82, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a77c910, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbf610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x84, ret_val_ptr_out = 0xffffe0003a77c910
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbf610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x82, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x82, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a77c910, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba1f8de0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba1f8de0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba1f8de0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba1f8de0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbf610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x84, ret_val_ptr_out = 0xffffe0003a77c910
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbf610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x82, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000b9fbf610, Length = 0x82, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a77c910, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba1f8de0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba1f8de0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000ba1f8de0, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9fbee80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf0, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9fbee80, Length = 0xf0, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x102, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b91168e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
ObQueryNameString Object_ptr = 0xffffc000b91168e0, Length = 0x100, ObjectNameInfo_unk_out = 0xffffe0003af89f00, ReturnLength_ptr_out = 0xffffd00032ab6c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\OID\EncodingType 0\CertDllCreateCertificateChainEngine\Config\Default
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
For performance reasons, the remaining entries are omitted.
Click to download all entries as text file.
Execution Path #153 (length: 671, count: 1, processes: 1)
»
Information Value
Sequence Length 671
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x126, ret_val_ptr_out = 0xffffe0003a785af0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x124, ret_val_ptr_out = 0xffffe0003a774bb0
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x124, ObjectNameInfo_unk_out = 0xffffe0003a774bb0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan
ExFreePoolWithTag P_ptr = 0xffffe0003a774bb0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785af0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x126, ret_val_ptr_out = 0xffffe0003a785af0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x124, ret_val_ptr_out = 0xffffe0003a774bb0
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x124, ObjectNameInfo_unk_out = 0xffffe0003a774bb0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan
ExFreePoolWithTag P_ptr = 0xffffe0003a774bb0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785af0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x126, ret_val_ptr_out = 0xffffe0003a785af0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x124, ret_val_ptr_out = 0xffffe0003a774bb0
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x124, ObjectNameInfo_unk_out = 0xffffe0003a774bb0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan
ExFreePoolWithTag P_ptr = 0xffffe0003a774bb0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785af0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x126, ret_val_ptr_out = 0xffffe0003a785af0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x124, ret_val_ptr_out = 0xffffe0003a774bb0
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x124, ObjectNameInfo_unk_out = 0xffffe0003a774bb0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan
ExFreePoolWithTag P_ptr = 0xffffe0003a774bb0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785af0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0a3860, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0a3860, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc0, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xbe, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc0, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xbe, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc0, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xbe, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc0, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0xbe, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc0, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xbe, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc0, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xbe, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc0, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xbe, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #156 (length: 1739, count: 1, processes: 1)
»
Information Value
Sequence Length 1739
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd4, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd2, ret_val_ptr_out = 0xffffe0003a782bd0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xd2, ObjectNameInfo_unk_out = 0xffffe0003a782bd0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft
ExFreePoolWithTag P_ptr = 0xffffe0003a782bd0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x142, ret_val_ptr_out = 0xffffe0003a770eb0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x140, ret_val_ptr_out = 0xffffe0003a785ec0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x140, ObjectNameInfo_unk_out = 0xffffe0003a785ec0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a770eb0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x142, ret_val_ptr_out = 0xffffe0003a770eb0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x140, ret_val_ptr_out = 0xffffe0003a785ec0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x140, ObjectNameInfo_unk_out = 0xffffe0003a785ec0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a770eb0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8e80830, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8e80830, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x142, ret_val_ptr_out = 0xffffe0003a770eb0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8e80830, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8e80830, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x140, ret_val_ptr_out = 0xffffe0003a785ec0
ObQueryNameString Object_ptr = 0xffffc000b8e80830, Length = 0x140, ObjectNameInfo_unk_out = 0xffffe0003a785ec0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a770eb0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x142, ret_val_ptr_out = 0xffffe0003a770eb0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x140, ret_val_ptr_out = 0xffffe0003a785ec0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x140, ObjectNameInfo_unk_out = 0xffffe0003a785ec0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a770eb0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x142, ret_val_ptr_out = 0xffffe0003a770eb0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x140, ret_val_ptr_out = 0xffffe0003a785ec0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x140, ObjectNameInfo_unk_out = 0xffffe0003a785ec0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a770eb0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x142, ret_val_ptr_out = 0xffffe0003a770eb0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x140, ret_val_ptr_out = 0xffffe0003a785ec0
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x140, ObjectNameInfo_unk_out = 0xffffe0003a785ec0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\User_Feed_Synchronization-{447529D0-7CBF-4A66-92FE-00C87AC907BC}
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a770eb0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe4, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe2, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xe2, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe4, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe2, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xe2, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe4, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe2, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0xe2, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe4, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe2, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0xe2, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe4, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe2, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0xe2, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe4, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe2, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0xe2, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2b0d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10a, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x108, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x108, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x6, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = SD, _String2 = ImagePath, ret_val_out = 10
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Control Panel\International, DestinationString_out = \REGISTRY\USER\.DEFAULT\Control Panel\International
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Control Panel\International, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -16
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10a, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x108, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x108, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10a, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x108, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x108, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10a, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x108, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x108, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10a, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9f825d0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x108, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b9f825d0, Length = 0x108, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10a, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x108, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x108, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10a, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x108, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x108, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10a, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x108, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x108, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x132, ret_val_ptr_out = 0xffffe0003a785ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x130, ret_val_ptr_out = 0xffffe0003a785c30
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x130, ObjectNameInfo_unk_out = 0xffffe0003a785c30, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install
ExFreePoolWithTag P_ptr = 0xffffe0003a785c30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x132, ret_val_ptr_out = 0xffffe0003a785ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x130, ret_val_ptr_out = 0xffffe0003a785c30
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x130, ObjectNameInfo_unk_out = 0xffffe0003a785c30, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install
ExFreePoolWithTag P_ptr = 0xffffe0003a785c30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8e80830, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8e80830, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x132, ret_val_ptr_out = 0xffffe0003a785ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8e80830, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8e80830, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x130, ret_val_ptr_out = 0xffffe0003a785c30
ObQueryNameString Object_ptr = 0xffffc000b8e80830, Length = 0x130, ObjectNameInfo_unk_out = 0xffffe0003a785c30, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install
ExFreePoolWithTag P_ptr = 0xffffe0003a785c30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x132, ret_val_ptr_out = 0xffffe0003a785ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x130, ret_val_ptr_out = 0xffffe0003a785c30
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x130, ObjectNameInfo_unk_out = 0xffffe0003a785c30, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install
ExFreePoolWithTag P_ptr = 0xffffe0003a785c30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x132, ret_val_ptr_out = 0xffffe0003a785ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x130, ret_val_ptr_out = 0xffffe0003a785c30
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x130, ObjectNameInfo_unk_out = 0xffffe0003a785c30, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install
ExFreePoolWithTag P_ptr = 0xffffe0003a785c30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x132, ret_val_ptr_out = 0xffffe0003a785ec0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9be2800, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x130, ret_val_ptr_out = 0xffffe0003a785c30
ObQueryNameString Object_ptr = 0xffffc000b9be2800, Length = 0x130, ObjectNameInfo_unk_out = 0xffffe0003a785c30, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Maintenance Install
ExFreePoolWithTag P_ptr = 0xffffe0003a785c30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785ec0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba381610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba381610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x126, ret_val_ptr_out = 0xffffe0003a785c30
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba381610, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba381610, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x124, ret_val_ptr_out = 0xffffe0003a785af0
ObQueryNameString Object_ptr = 0xffffc000ba381610, Length = 0x124, ObjectNameInfo_unk_out = 0xffffe0003a785af0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan
ExFreePoolWithTag P_ptr = 0xffffe0003a785af0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785c30, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x126, ret_val_ptr_out = 0xffffe0003a785c30
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x124, ret_val_ptr_out = 0xffffe0003a785af0
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x124, ObjectNameInfo_unk_out = 0xffffe0003a785af0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Scan
ExFreePoolWithTag P_ptr = 0xffffe0003a785af0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a785c30, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
For performance reasons, the remaining entries are omitted.
Click to download all entries as text file.
Execution Path #158 (length: 215, count: 1, processes: 1)
»
Information Value
Sequence Length 215
Processes
»
Process Count
Process 16 (officeclicktorun.exe, PID: 1740) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd2, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd0, ret_val_ptr_out = 0xffffe0003a782f30
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0xd0, ObjectNameInfo_unk_out = 0xffffe0003a782f30, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified
ExFreePoolWithTag P_ptr = 0xffffe0003a782f30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd2, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd0, ret_val_ptr_out = 0xffffe0003a782f30
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0xd0, ObjectNameInfo_unk_out = 0xffffe0003a782f30, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified
ExFreePoolWithTag P_ptr = 0xffffe0003a782f30, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000293450d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd2, ret_val_ptr_out = 0xffffe0003a76faa0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8df4a80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344db8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd0, ret_val_ptr_out = 0xffffe0003a782f30
ObQueryNameString Object_ptr = 0xffffc000b8df4a80, Length = 0xd0, ObjectNameInfo_unk_out = 0xffffe0003a782f30, ReturnLength_ptr_out = 0xffffd00029344db8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified
ExFreePoolWithTag P_ptr = 0xffffe0003a782f30, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x2a, ret_val_ptr_out = 0xffffe0003af83eb0
_wcsicmp _String1 = officeclicktorun.exe, _String2 = ImagePath, ret_val_out = 6
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af83eb0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7bd5a40, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7bd5a40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7bd5a40, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7bd5a40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b7bd5a40, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8544700, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8544700, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf4, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8544700, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8544700, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b8544700, Length = 0xf2, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8544700, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8544700, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000293450d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf4, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8544700, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8544700, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344db8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf2, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b8544700, Length = 0xf2, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd00029344db8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1c, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = RulesEndpoint, _String2 = ImagePath, ret_val_out = 9
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7bd5a40, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7bd5a40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xae, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7bd5a40, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7bd5a40, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xac, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b7bd5a40, Length = 0xac, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common\ClientTelemetry, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78fea90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78fea90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b78fea90, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b78fea90, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa2, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b78fea90, Length = 0xa2, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Common\ClientTelemetry
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\Common\ClientTelemetry, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b6827830, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b6827830, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8e, ret_val_ptr_out = 0xffffe0003a77c910
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b6827830, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b6827830, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8c, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000b6827830, Length = 0x8c, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd00029344c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Software\Microsoft\Office\16.0\Common, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a77c910, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
Execution Path #157 (length: 160, count: 1, processes: 1)
»
Information Value
Sequence Length 160
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2b0d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x26, ret_val_ptr_out = 0xffffe0003af83eb0
_wcsicmp _String1 = SecurityDescriptor, _String2 = ImagePath, ret_val_out = 10
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af83eb0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2b0d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = Source, _String2 = ImagePath, ret_val_out = 10
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2b0d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = Author, _String2 = ImagePath, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2b0d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x18, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = Description, _String2 = ImagePath, ret_val_out = -5
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2b0d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = URI, _String2 = ImagePath, ret_val_out = 12
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2b0d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x12, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = Triggers, _String2 = ImagePath, ret_val_out = 11
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2b0d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2adb8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10, ret_val_ptr_out = 0xffffe0003c634250
_wcsicmp _String1 = Actions, _String2 = ImagePath, ret_val_out = -8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #189 (length: 187, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 187
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fa150, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fa150, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003a763520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fa150, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fa150, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a7862c0
ObQueryNameString Object_ptr = 0xffffc000ba0fa150, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a7862c0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Control Panel\International, DestinationString_out = \REGISTRY\USER\.DEFAULT\Control Panel\International
ExFreePoolWithTag P_ptr = 0xffffe0003a7862c0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Control Panel\International, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -16
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, ret_val_ptr_out = 0xffffe0003c6341c0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x78, ret_val_ptr_out = 0xffffe0003a763520
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x78, ObjectNameInfo_unk_out = 0xffffe0003a763520, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Control Panel\International, DestinationString_out = \REGISTRY\USER\.DEFAULT\Control Panel\International
ExFreePoolWithTag P_ptr = 0xffffe0003a763520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \Control Panel\International, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -16
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fa150, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fa150, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fa150, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fa150, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fa150, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x110, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10e, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x10e, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd0002ed2ac98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E5217668-D921-4907-8CE1-276EABA44515}
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a4ee180
PsGetProcessImageFileName ret_val_out = 0xffffe0003a4ee5d0
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #190 (length: 172, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 172
Processes
»
Process Count
Process 16 (officeclicktorun.exe, PID: 1740) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000293450d8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10a, ret_val_ptr_out = 0xffffe0003a7664d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0fcea0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd00029344db8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x108, ret_val_ptr_out = 0xffffe0003a769010
ObQueryNameString Object_ptr = 0xffffc000ba0fcea0, Length = 0x108, ObjectNameInfo_unk_out = 0xffffe0003a769010, ReturnLength_ptr_out = 0xffffd00029344db8, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor, DestinationString_out = \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor
ExFreePoolWithTag P_ptr = 0xffffe0003a769010, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x14, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = ULSTagIds, _String2 = ImagePath, ret_val_out = 12
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003f9fb180
PsGetProcessImageFileName ret_val_out = 0xffffe0003f9fb5d0
_stricmp _Str1 = OfficeClickToR, _Str2 = winlogon.exe, ret_val_out = -8
Execution Path #161 (length: 3012, count: 1, processes: 1)
»
Information Value
Sequence Length 3012
Processes
»
Process Count
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xea, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe8, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0xe8, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Security, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Security
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Internet Explorer\Security, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -14
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x90, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x90, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xea, ret_val_ptr_out = 0xffffe0003a763f10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xe8, ret_val_ptr_out = 0xffffe0003a763e10
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0xe8, ObjectNameInfo_unk_out = 0xffffe0003a763e10, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Security, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Internet Explorer\Security
ExFreePoolWithTag P_ptr = 0xffffe0003a763e10, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Internet Explorer\Security, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -14
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x90, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x90, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Security
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x116, ret_val_ptr_out = 0xffffe0003a7879d0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x114, ret_val_ptr_out = 0xffffe0003a769ee0
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x114, ObjectNameInfo_unk_out = 0xffffe0003a769ee0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3, DestinationString_out = \REGISTRY\USER\S-1-5-21-1560258661-3990802383-1811730007-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
ExFreePoolWithTag P_ptr = 0xffffe0003a769ee0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\USER\, ret_val_out = 0
_wcsicmp _String1 = \SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3, _String2 = \Software\Microsoft\Windows\CurrentVersion\Policies\System, ret_val_out = -7
ExFreePoolWithTag P_ptr = 0xffffe0003a7879d0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbe, ret_val_ptr_out = 0xffffe0003a76e520
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xbc, ret_val_ptr_out = 0xffffe0003a782cc0
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0xbc, ObjectNameInfo_unk_out = 0xffffe0003a782cc0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
ExFreePoolWithTag P_ptr = 0xffffe0003a782cc0, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x98, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x96, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x96, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winsock\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winsock\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x98, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x96, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x96, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winsock\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winsock\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa6, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0xa4, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Psched\Parameters\Winsock, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Psched\Parameters\Winsock
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa6, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0xa4, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Psched\Parameters\Winsock, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Psched\Parameters\Winsock
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa6, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0xa4, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Psched\Parameters\Winsock, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Psched\Parameters\Winsock
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc4, ret_val_ptr_out = 0xffffe0003a782f30
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc2, ret_val_ptr_out = 0xffffe0003a782e50
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0xc2, ObjectNameInfo_unk_out = 0xffffe0003a782e50, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winsock\Setup Migration\Providers\Psched, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winsock\Setup Migration\Providers\Psched
ExFreePoolWithTag P_ptr = 0xffffe0003a782e50, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a782f30, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa2, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0xa2, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa2, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0xa2, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc2, ret_val_ptr_out = 0xffffe0003a782f30
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc0, ret_val_ptr_out = 0xffffe0003a76e520
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0xc0, ObjectNameInfo_unk_out = 0xffffe0003a76e520, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winsock\Setup Migration\Providers\Tcpip, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winsock\Setup Migration\Providers\Tcpip
ExFreePoolWithTag P_ptr = 0xffffe0003a76e520, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a782f30, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa2, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0xa2, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa2, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0xa2, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa2, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0xa2, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Winsock
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b8defc80, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b8defc80, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x92, ret_val_ptr_out = 0xffffe0003af95f60
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x92, ObjectNameInfo_unk_out = 0xffffe0003af95f60, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters
For performance reasons, the remaining entries are omitted.
Click to download all entries as text file.
Execution Path #192 (length: 82, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 82
Processes
»
Process Count
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa6, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0xa4, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa6, ret_val_ptr_out = 0xffffe0003af7df50
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9112450, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa4, ret_val_ptr_out = 0xffffe0003af7de90
ObQueryNameString Object_ptr = 0xffffc000b9112450, Length = 0xa4, ObjectNameInfo_unk_out = 0xffffe0003af7de90, ReturnLength_ptr_out = 0xffffd0002af86c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SecurityProviders\SCHANNEL
ExFreePoolWithTag P_ptr = 0xffffe0003af7de90, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
Execution Path #168 (length: 189, count: 1, processes: 1)
»
Information Value
Sequence Length 189
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #196 (length: 159, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 159
Processes
»
Process Count
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003c3ce740
PsGetProcessImageFileName ret_val_out = 0xffffe0003c3ceb90
_stricmp _Str1 = msfeedssync.ex, _Str2 = winlogon.exe, ret_val_out = -10

Kernel Graph 9

Kernel Graph

Kernel Graph Legend
Code Block #13 (EP #11, #19, #24, #27, #25, #31, #147, #43, #48, #49, #53, #54, #55, #56, #59, #65, #67, #68, #69, #70, #71, #74, #75, #77, #80,...)
»
Information Value
Trigger IofCallDriver+0x4b
Start Address 0xfffff800fc2ba090
Execution Path #11 (length: 58, count: 1, processes: 1)
»
Information Value
Sequence Length 58
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7638f0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff800010b0, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff800010b0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff800010b0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff800010b0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x48007
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a763a6c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044807f40
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003c831cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044807f40, MemoryDescriptorList_unk_out = 0xffffe00044807f40
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003c831cf0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c831cf0, Irp_unk_out = 0xffffe0003c831cf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe00044807f40
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a766010
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80001098, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001098, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001098, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80001098, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x48006
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76618c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044807f40
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003c831cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044807f40, MemoryDescriptorList_unk_out = 0xffffe00044807f40
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003c831cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c831cf0, Irp_unk_out = 0xffffe0003c831cf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe00044807f40
Execution Path #19 (length: 23, count: 1, processes: 1)
»
Information Value
Sequence Length 23
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 1
Sequence
»
Symbol Parameters
PsGetCurrentProcessId ret_val_unk_out = 0x378
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a76fb90
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x378, Process_unk_out = 0xffffd0002aa70570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003bd9b5c0, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002aa70528, Handle_out = 0xffffffff80000870, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000870, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002aa70520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000870, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002aa70520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000870, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003bd9b5c0, ret_val_ptr_out = 0x400b9
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76fd0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b494460
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002aa70370, ret_val_unk_out = 0xffffe0003b7c9cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b494460, MemoryDescriptorList_unk_out = 0xffffe0003b494460
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003b7c9cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003b494460
Execution Path #24 (length: 12, count: 2, processes: 1)
»
Information Value
Sequence Length 12
Processes
»
Process Count
Process 2 (System, PID: 4) 2
Sequence
»
Symbol Parameters
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d296eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c831cf0, Irp_unk_out = 0xffffe0003c831cf0, ret_val_out = 0x103
Execution Path #27 (length: 238, count: 1, processes: 1)
»
Information Value
Sequence Length 238
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296d68, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf8, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b7c159e0, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xf6, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000b7c159e0, Length = 0xf6, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd0002d296a48, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{E25A642B-6CEB-4194-8F83-8BC82AF94F5A}
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #25 (length: 12, count: 3, processes: 1)
»
Information Value
Sequence Length 12
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 3
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #31 (length: 23, count: 6, processes: 3)
»
Information Value
Sequence Length 23
Processes
»
Process Count
Process 16 (officeclicktorun.exe, PID: 1740) 1
Process 25 (winlogon.exe, PID: 508) 4
Process 42 (iexplore.exe, PID: 556) 1
Sequence
»
Symbol Parameters
PsGetCurrentProcessId ret_val_unk_out = 0x6cc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x6cc, Process_unk_out = 0xffffd00032ab6540, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003f9fb180, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd00032ab64f8, Handle_out = 0xffffffff80000fe8, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000fe8, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab64f0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a76faa0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000fe8, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0xd8, ProcessInformation_ptr_out = 0xffffe0003a76faa0, ReturnLength_ptr_out = 0xffffd00032ab64f0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000fe8, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003f9fb180, ret_val_ptr_out = 0x3ffb4
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76962c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f8750
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c439c20, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd00032ab6340, ret_val_unk_out = 0xffffe0003c84acf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f8750, MemoryDescriptorList_unk_out = 0xffffe0003c1f8750
IofCallDriver DeviceObject_unk = 0xffffe0003c439c20, Irp_unk = 0xffffe0003c84acf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c84acf0, Irp_unk_out = 0xffffe0003c84acf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003c1f8750
Execution Path #147 (length: 83, count: 1, processes: 1)
»
Information Value
Sequence Length 83
Processes
»
Process Count
Process 16 (officeclicktorun.exe, PID: 1740) 1
Sequence
»
Symbol Parameters
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1c7, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a785700
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000fe8, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00032ab6c18, Object_out = 0xffffe0003b726600, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObfDereferenceObject Object_ptr = 0xffffe0003b726600, ret_val_ptr_out = 0x7fff
PsGetCurrentProcessId ret_val_unk_out = 0x6cc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a782010
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x6cc, Process_unk_out = 0xffffd00032ab6540, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003f9fb180, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd00032ab64f8, Handle_out = 0xffffffff80000b84, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000b84, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00032ab64f0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0xd8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a76faa0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000b84, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0xd8, ProcessInformation_ptr_out = 0xffffe0003a76faa0, ReturnLength_ptr_out = 0xffffd00032ab64f0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000b84, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003f9fb180, ret_val_ptr_out = 0x3ffb8
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003a76faa0, Tag = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a78218c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c439c20, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd00032ab6340, ret_val_unk_out = 0xffffe0003b7c9cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
IofCallDriver DeviceObject_unk = 0xffffe0003c439c20, Irp_unk = 0xffffe0003b7c9cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe00040932cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a782464, SpinLock_unk_out = 0xffffe0003a782464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a782464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a782464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a782464, SpinLock_unk_out = 0xffffe0003a782464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a782464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a782464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a782464, SpinLock_unk_out = 0xffffe0003a782464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a782464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a782464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a782464, SpinLock_unk_out = 0xffffe0003a782464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a782464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a782464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a782464, SpinLock_unk_out = 0xffffe0003a782464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a782464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a782464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1c7, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a788010
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000b84, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00032ab6c18, Object_out = 0xffffe0003c1931b0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObfDereferenceObject Object_ptr = 0xffffe0003c1931b0, ret_val_ptr_out = 0x7fff
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x28, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a787240
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c8359e0, Irp_unk_out = 0xffffe0003c8359e0, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7881bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x3f, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a788250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
Execution Path #43 (length: 6, count: 2, processes: 1)
»
Information Value
Sequence Length 6
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 2
Sequence
»
Symbol Parameters
PsGetCurrentProcessId ret_val_unk_out = 0x1fc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x884
Execution Path #48 (length: 1, count: 4, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 4
Sequence
»
Symbol Parameters
IoCompleteRequest ret_val_out = 0x0
Execution Path #49 (length: 19, count: 1, processes: 1)
»
Information Value
Sequence Length 19
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0a8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
Execution Path #53 (length: 7, count: 1, processes: 1)
»
Information Value
Sequence Length 7
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmAllocatePagesForMdl LowAddress_unk = 0x0, HighAddress_unk = 0xffffffffffffffff, SkipBytes_unk = 0x0, TotalBytes_ptr = 0x640000, ret_val_unk_out = 0xffffe0003a775000
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003a775000, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xffffd00000000010, ret_val_ptr_out = 0xffffdff441600000
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003a775000, AccessMode_unk = 0x1, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xffffd00000000020, ret_val_ptr_out = 0x4620000
MmAllocatePagesForMdl LowAddress_unk = 0x0, HighAddress_unk = 0xffffffffffffffff, SkipBytes_unk = 0x0, TotalBytes_ptr = 0x40000, ret_val_unk_out = 0xffffe000407da380
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000407da380, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xffffd00000000010, ret_val_ptr_out = 0xffffd00045a00000
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000407da380, AccessMode_unk = 0x1, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xffffd00000000020, ret_val_ptr_out = 0x460000
IoCompleteRequest ret_val_out = 0x0
Execution Path #54 (length: 7, count: 3, processes: 1)
»
Information Value
Sequence Length 7
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 3
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xfffff80000000010, ret_val_ptr_out = 0xffffd00043ff69e8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x27f, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7707c0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0a8
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #55 (length: 5, count: 109, processes: 1)
»
Information Value
Sequence Length 5
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 109
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00043ffaef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #56 (length: 6, count: 1, processes: 1)
»
Information Value
Sequence Length 6
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
ObReferenceObjectByHandle Handle_unk = 0x4e8, DesiredAccess_unk = 0x10000000, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Object_ptr_out = 0xfffff800fc55af28, Object_out = 0xffffe0003c493140, HandleInformation_unk_out = 0xffffd00045a470d0, ret_val_out = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x400, ret_val_ptr_out = 0xffffe0003a76f690
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76f690, Length = 0x400, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0004cbc3820
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0004cbc3820, MemoryDescriptorList_unk_out = 0xffffe0004cbc3820
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0004cbc3820, AccessMode_unk = 0x1, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xffffd00000000010, ret_val_ptr_out = 0x4a0690
IoCompleteRequest ret_val_out = 0x0
Execution Path #59 (length: 20, count: 4, processes: 1)
»
Information Value
Sequence Length 20
Processes
»
Process Count
Process 2 (System, PID: 4) 4
Sequence
»
Symbol Parameters
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b4669f0, Irp_unk_out = 0xffffe0003b4669f0, ret_val_out = 0x103
Execution Path #65 (length: 21, count: 16, processes: 2)
»
Information Value
Sequence Length 21
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 15
Process 42 (iexplore.exe, PID: 556) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = * (e.g. 0xfffff800fc55c0b0), ret_val_unk_out = * (e.g. 0x0)
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
Execution Path #67 (length: 14, count: 12, processes: 1)
»
Information Value
Sequence Length 14
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 12
Sequence
»
Symbol Parameters
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1c7, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a787590
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObReferenceObjectByHandle Handle_unk = 0xffffffff800010a0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd0002af86b88, Object_out = 0xffffe0003b6db7a0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObfDereferenceObject Object_ptr = 0xffffe0003b6db7a0, ret_val_ptr_out = 0x7fff
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x28, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af83eb0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b4669f0, Irp_unk_out = 0xffffe0003b4669f0, ret_val_out = 0x103
Execution Path #68 (length: 3, count: 15, processes: 1)
»
Information Value
Sequence Length 3
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 15
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
Execution Path #69 (length: 12, count: 19, processes: 1)
»
Information Value
Sequence Length 12
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 19
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd00043feb050
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a763a6c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcb2440
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcb2440, MemoryDescriptorList_unk_out = 0xffffe0003bcb2440
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0004c9e7d00, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0xffffd00043feb050, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd00043feb040, ret_val_unk_out = 0xffffe0003c719010
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c719010, Irp_unk_out = 0xffffe0003c719010, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003bcb2440
KeWaitForMutexObject ret_val_out = 0x0
IoCompleteRequest ret_val_out = 0x0
Execution Path #70 (length: 16, count: 18, processes: 1)
»
Information Value
Sequence Length 16
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 18
Sequence
»
Symbol Parameters
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00043ff5040, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00043ff5020, ClientId_deref_UniqueProcess_unk = 0x1fc, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00043ff5000, ProcessHandle_out = 0x4ec, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0x4ec, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00043ff5098, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7c, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0x4ec, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7c, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd00043ff5098, ret_val_out = 0x0
ZwOpenFile DesiredAccess_unk = 0x80000000, ObjectAttributes_ptr = 0xffffd00043ff5040, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Device\HarddiskVolume1\Windows\System32\winlogon.exe, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ShareAccess = 0x3, OpenOptions = 0x0, FileHandle_ptr_out = 0xffffd00043ff5008, FileHandle_out = 0xffffffff80000f98, IoStatusBlock_unk_out = 0xffffd00043ff5030, ret_val_out = 0x0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000f98, DesiredAccess_unk = 0x10000000, ObjectType_unk = 0xffffe0003a468dc0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00043ff50a8, Object_out = 0xffffe0003c87c8a0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
IoVolumeDeviceToDosName VolumeDeviceObject_ptr = 0xffffe0003b695780, DosName_out = C:, ret_val_out = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x86, ret_val_ptr_out = 0xffffe0003a763d70
RtlAppendUnicodeStringToString Destination = \??\, Source = C:, Destination_out = \??\C:, ret_val_out = 0x0
RtlAppendUnicodeStringToString Destination = \??\C:, Source = \Windows\System32\winlogon.exe, Destination_out = \??\C:\Windows\System32\winlogon.exe, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003c87c8a0, ret_val_ptr_out = 0x8000
ZwClose Handle_unk = 0xffffffff80000f98, ret_val_out = 0x0
ZwClose Handle_unk = 0x4ec, ret_val_out = 0x0
RtlFreeAnsiString AnsiString = \
IoCompleteRequest ret_val_out = 0x0
Execution Path #71 (length: 8, count: 37, processes: 1)
»
Information Value
Sequence Length 8
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 37
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00028a11ef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #74 (length: 13, count: 3, processes: 1)
»
Information Value
Sequence Length 13
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 3
Sequence
»
Symbol Parameters
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c8359e0, Irp_unk_out = 0xffffe0003c8359e0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000bbc, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd0002af86b88, Object_out = 0xffffe0003b6db7a0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObfDereferenceObject Object_ptr = 0xffffe0003b6db7a0, ret_val_ptr_out = 0x7fff
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x28, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af83eb0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x103
Execution Path #75 (length: 3, count: 9, processes: 1)
»
Information Value
Sequence Length 3
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 9
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003be6f490, Irp_unk_out = 0xffffe0003be6f490, ret_val_out = 0x103
Execution Path #77 (length: 24, count: 10, processes: 1)
»
Information Value
Sequence Length 24
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 10
Sequence
»
Symbol Parameters
PsGetCurrentProcessId ret_val_unk_out = 0x1fc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7882a0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x1fc, Process_unk_out = 0xffffd0002af86540, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003bc53300, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002af864f8, Handle_out = 0xffffffff80001004, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001004, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002af864f0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7c, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001004, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7c, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002af864f0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80001004, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003bc53300, ret_val_ptr_out = 0x6805d
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\winlogon.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a78841c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c439c20, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002af86340, ret_val_unk_out = 0xffffe0003b7c9cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
IofCallDriver DeviceObject_unk = 0xffffe0003c439c20, Irp_unk = 0xffffe0003b7c9cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003c306640
Execution Path #80 (length: 10, count: 3, processes: 1)
»
Information Value
Sequence Length 10
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 3
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029a2cef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #81 (length: 23, count: 1, processes: 1)
»
Information Value
Sequence Length 23
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
PsGetCurrentProcessId ret_val_unk_out = 0x1fc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a786b90
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObOpenObjectByPointer Object_ptr = 0xffffe0003bc53300, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002a4394f8, Handle_out = 0xffffffff80001074, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001074, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002a4394f0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7c, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001074, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7c, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002a4394f0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80001074, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003bc53300, ret_val_ptr_out = 0x6808e
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\winlogon.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a786d0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c439c20, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002a439340, ret_val_unk_out = 0xffffe0003c674cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
IofCallDriver DeviceObject_unk = 0xffffe0003c439c20, Irp_unk = 0xffffe0003c674cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c674cf0, Irp_unk_out = 0xffffe0003c674cf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003c306640
Execution Path #83 (length: 12, count: 5, processes: 1)
»
Information Value
Sequence Length 12
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 5
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd00029a6bef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #88 (length: 127, count: 2, processes: 1)
»
Information Value
Sequence Length 127
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 2
Sequence
»
Symbol Parameters
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0xc800, Tag = 0x48545450, ret_val_ptr_out = 0xffffe0003a7a5000
sprintf _Format = GET /%s HTTP/1.1 Host: %s:%s Accept:*/* User-Agent:Mozilla/4.0 (compatible; MSIE 5.00; Windows 98) Connection:Keep-Alive , _Dest_out = GET /fp_1gVSnNlpoF1fqA6M.txt HTTP/1.1 Host: pte.ob1i67hdss.com:9888 Accept:*/* User-Agent:Mozilla/4.0 (compatible; MSIE 5.00; Windows 98) Connection:Keep-Alive , ret_val_out = 167
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x32, Tag = 0x54444953, ret_val_ptr_out = 0xffffe0003c634300
RtlInitUnicodeString SourceString = \Device\Tcp, DestinationString_out = \Device\Tcp
ZwCreateFile DesiredAccess_unk = 0xc0100000, ObjectAttributes_ptr = 0xffffd000292aa368, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Device\Tcp, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x1, CreateDisposition = 0x1, CreateOptions = 0x0, EaBuffer_ptr = 0xffffe0003c634300, EaBuffer_deref_NextEntryOffset = 0x0, EaBuffer_deref_Flags = 0x0, EaBuffer_deref_EaNameLength = 0x10, EaBuffer_deref_EaValueLength = 0x16, EaBuffer_deref_EaName = TransportAddress, EaBuffer_deref_EaValue_ptr = 0xffffe0003c634319, EaBuffer_deref_EaValue_deref_data = BINARY(offset=64451001,skipped=0,size=22), EaLength = 0x32, FileHandle_ptr_out = 0xffffd000292aa608, FileHandle_out = 0xffffffff80000ffc, IoStatusBlock_unk_out = 0xffffd000292aa338, ret_val_out = 0x0
PsGetCurrentProcessId ret_val_unk_out = 0x1fc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7b1b90
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x1fc, Process_unk_out = 0xffffd000292a9a80, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003bc53300, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd000292a9a38, Handle_out = 0xffffffff80000ffc, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000ffc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd000292a9a30, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7c, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000ffc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7c, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd000292a9a30, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000ffc, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003bc53300, ret_val_ptr_out = 0x680a4
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\winlogon.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a7b1d0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003bcb2440
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c439c20, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000292a9880, ret_val_unk_out = 0xffffe0003c839cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003bcb2440, MemoryDescriptorList_unk_out = 0xffffe0003bcb2440
IofCallDriver DeviceObject_unk = 0xffffe0003c439c20, Irp_unk = 0xffffe0003c839cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003bcb2440
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000ffc, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd000292aa550, Object_out = 0xffffe0003c851f20, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x22, Tag = 0x54444953, ret_val_ptr_out = 0xffffe0003a788210
ZwCreateFile DesiredAccess_unk = 0xc0100000, ObjectAttributes_ptr = 0xffffd000292aa368, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Device\Tcp, ObjectAttributes_deref_Attributes = 0x240, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, AllocationSize_ptr = 0x0, FileAttributes = 0x80, ShareAccess = 0x1, CreateDisposition = 0x1, CreateOptions = 0x0, EaBuffer_ptr = 0xffffe0003a788210, EaBuffer_deref_NextEntryOffset = 0x0, EaBuffer_deref_Flags = 0x0, EaBuffer_deref_EaNameLength = 0x11, EaBuffer_deref_EaValueLength = 0x8, EaBuffer_deref_EaName = ConnectionContext, EaBuffer_deref_EaValue_ptr = 0xffffe0003a78822a, EaBuffer_deref_EaValue_deref_data = BINARY(offset=64465186,skipped=0,size=8), EaLength = 0x32, FileHandle_ptr_out = 0xffffd000292aa610, FileHandle_out = 0xffffffff80001060, IoStatusBlock_unk_out = 0xffffd000292aa338, ret_val_out = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1c7, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7b6530
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80001060, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd000292aa5f0, Object_out = 0xffffe0003a4beb50, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
IoGetRelatedDeviceObject FileObject_unk = 0xffffe0003c851f20, ret_val_unk_out = 0xffffe0003c439c20
IoGetLowerDeviceObject DeviceObject_unk = 0xffffe0003c439c20, ret_val_unk_out = 0xffffe0004c9e7d00
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd000292aa398
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0004c9e7d00, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0xffffd000292aa398, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000292aa338, ret_val_unk_out = 0xffffe0003c719010
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c719010, Irp_unk_out = 0xffffe0003c719010, ret_val_out = 0x0
KeSetEvent Event_unk = 0xffffd000292aa398, Increment_unk = 0x0, Wait = 0, Event_unk_out = 0xffffd000292aa398, ret_val_out = 0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd000292aa350
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0004c9e7d00, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0xffffd000292aa350, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000292aa338, ret_val_unk_out = 0xffffe0003b0d8700
strstr _Str = 103.146.100.242, _SubStr = ., ret_val_out = .146.100.242
atoi _Str = 103, ret_val_out = 103
strstr _Str = 146.100.242, _SubStr = ., ret_val_out = .100.242
atoi _Str = 146, ret_val_out = 146
strstr _Str = 100.242, _SubStr = ., ret_val_out = .242
atoi _Str = 100, ret_val_out = 100
atoi _Str = 242, ret_val_out = 242
atoi _Str = 9888, ret_val_out = 9888
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b0d8700, Irp_unk_out = 0xffffe0003b0d8700, ret_val_out = 0x103
KeWaitForMutexObject ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003c851f20, ret_val_ptr_out = 0x7fff
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd000292aa510
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0xa7, Tag = 0x54444953, ret_val_ptr_out = 0xffffe0003af7df50
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0004c9e7d00, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0xffffd000292aa510, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000292aa500, ret_val_unk_out = 0xffffe0003c716010
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003af7df50, Length = 0xa7, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0xffffe0003c716010, Irp_unk_out = 0xffffe0003c716010, ret_val_unk_out = 0xffffe0003b098f40
MmProbeAndLockPages MemoryDescriptorList_unk = 0xffffe0003b098f40, AccessMode_unk = 0x0, Operation_unk = 0x2, MemoryDescriptorList_unk_out = 0xffffe0003b098f40
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c716010, Irp_unk_out = 0xffffe0003c716010, ret_val_out = 0x103
KeWaitForMutexObject ret_val_out = 0x0
MmUnlockPages MemoryDescriptorList_unk = 0xffffe0003b098f40, MemoryDescriptorList_unk_out = 0xffffe0003b098f40
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd000292aa508
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0004c9e7d00, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0xffffd000292aa508, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000292aa4f8, ret_val_unk_out = 0xffffe0003c713010
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a7a5000, Length = 0xc800, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00040932cf0
MmProbeAndLockPages MemoryDescriptorList_unk = 0xffffe00040932cf0, AccessMode_unk = 0x0, Operation_unk = 0x2, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c713010, Irp_unk_out = 0xffffe0003c713010, ret_val_out = 0x103
KeSetEvent Event_unk = 0xffffd000292aa508, Increment_unk = 0x0, Wait = 0, Event_unk_out = 0xffffd000292aa508, ret_val_out = 0
KeWaitForMutexObject ret_val_out = 0x0
MmUnlockPages MemoryDescriptorList_unk = 0xffffe00040932cf0, MemoryDescriptorList_unk_out = 0xffffe00040932cf0
strstr _Str = HTTP/1.1 200 OK Server: nginx/1.20.2 Date: Sun, 10 Apr 2022 07:54:15 GMT Content-Type: text/plain Content-Length: 2008 Last-Modified: Fri, 08 Apr 2022 07:37:12 GMT Connection: keep-alive ETag: "624fe628-7d8" Accept-Ranges: bytes FQdlCO+AM25vA7DCaHgvXG8RG8wuFPj5ce35YBzdCkX4uTUFLhriHtu/Oi+UWJr4ZhL0V98C+J1oSUVvj04vZpOlpNaUS9xq32c5ytzGCzS/nghLiCKxCZzOWbuqSj0VH/+OAimTeFkmPVMIlH/c/0nKqrtkyaXm+SnGKLlT9E7odjcqbgb2f0DpCq5MqxVIvGta+gRxI5YtK0faM7SxHCXpiAzfTe59M/nPHe7/zopwYMOO5+5uJMv6wVFKoen2q1FSxtWtIJEUHoKNJKzhvKoNzCvEtyPFPBa84OtgXnIEq06KVlic2ZdgKZWPJZTZY83i/o09zB4CiWBTrnzYd3/pGEZQFiOpCkbbly3Z59N2byuvjp6d+ioPy9PESDRKGxI0YWiyq9vEsf0+rr09KsWidQssB5hfFHcdxPCkeM/+kvepXMKaeC7IqmxDY/FuCxNfSM3/4GTmjPLhBKtApqwpILgUYmZaS4aAW4Qz2lbnKc61vAjkVYYz0r6gxmuAkPwWxnHLE7YySS1SX1e/repZPug/Q7n/tvxMRdc/e0p2JBc/BpgCHnslJfbMjoKdynj7oGI9D2TVq13iJErDGG8RG8wuFPj5ce35YBzdCkV/dW/b5utmUPjirEhBXg4EHVVkgYWTELTH+XvtJ4xS2grG5f6f8ldj+RWRZaVfVN3S9Fm7jcFxzmwnHfHqoCSBU8hpmEddZozAPocBu/9L0gKzHmU6rBVK4HKnnoXCA11blSGZzdLN0zGXMZ25w7ghiZdUIFe4RxCk/nJXvMo5y46JVXNDYI/lE/WWrgdnRyy3S/jULnHZy8pRl6rssNgEwtXA/4yMOrWtAIEVJ7GnelPIaZhHXWaMwD6HAbv/S9IXANy3iD2f+zZPPWS9UKXIbxEbzC4U+Plx7flgHN0KRd6sVUkPtXpvAKW1+cqijr/ZiOZpMNvhlWgs5kj+dMXAPjdrHHPSvRVa24eEwmN+JBxP4iQNtw7lYMqxUcgTeICNdwmXI1eInCsyiUuzhZdoLFDYFJeQNZ8jHvTu/lXH2nUCUqgQcarMFqiFw+cs3VH3AsRxvSxVxlw1N6Jy3lV6V1LK1Jym6XWopr8fbr3fW8Wb5tSexZaCU+RRLSAR4BjggEn5vqe53R442LxGNRkDIiZKoWm8LohL6qQC9r8gwKNp4nSX5pUE4XFi3Kzs2MS1K0q9SlTM1Rny7w844QItzoYiWC5svj8p5sBy5gyLXeVFGtyMTFM59i6o/eRRiVMKjaZ3PdM1AQmF7LlBLlzqWgTyNq08Rm0CHO2B3jb8NXbxI/8Gcyv79PjucuMvahS018yb5k+A/d1kTijF9ltQ97yuqy5NCWeEVoLWi5+TFwRM9XwN243TfMBxdEOxzGUdik4ElqmpBOL2XoFZOUWrp8HoZsM4Czs8DB2szNJ8sjOvc1wT+bssN0jnORgCRu4ALixL6fD4h5/RiiGQ3hzDK/e9SwP/NVq0K/3a/W+LWlWvIMK2gmrT19SpCXs3bhrZE/ONxfzF5XI09qDOfrmsSuX+KHS4UbKo+pMWOLO1rdykgybx0rvJPOKBZQB/YWIKZpHVCt59DRnAdlh9EU73SVUm9lt6XqQRCpRCyCIgE+9A+SP4w9gGCIdjaGt1JFzfjk8rXJ47L9K64FjP678r440zwHledrCpbqC1EpllI1xb/QflRCPqo1io1yHTH7FsMUoHFPOwoChp3f4GKPeR3HWHzbuWzAVu9APy91S+5nOFp/UilrTGduL4CuJjqRh+s61t3GCld6OYtfxiFfCrO9ZYyd9cjh/VbnO3UiOr8v1c+ugLSE4FW6ZNew1fn0f1CBlPDBksqrD2eQFCJa1MXM13hQWMJud+E/7sFOge8fLxG+w1kTz+5zw3QC5OiNmuEhnT3iGnchR5eAAtHdUGZ9VLCU14OpmB2go2nnx8nz43axxz0r0VWtuHhMJjfiTmEZVhWU9b30Wcar3ZMHeZ39qY9MpWyGVisueCMa60fA==, _SubStr = Content-Length: , ret_val_out = Content-Length: 2008 Last-Modified: Fri, 08 Apr 2022 07:37:12 GMT Connection: keep-alive ETag: "624fe628-7d8" Accept-Ranges: bytes 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
strstr _Str = Content-Length: 2008 Last-Modified: Fri, 08 Apr 2022 07:37:12 GMT Connection: keep-alive ETag: "624fe628-7d8" Accept-Ranges: bytes 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, _SubStr = , ret_val_out = Last-Modified: Fri, 08 Apr 2022 07:37:12 GMT Connection: keep-alive ETag: "624fe628-7d8" Accept-Ranges: bytes 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
atoi _Str = 2008, ret_val_out = 2008
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7dc, Tag = 0x48545450, ret_val_ptr_out = 0xffffe0003a779010
strstr _Str = HTTP/1.1 200 OK Server: nginx/1.20.2 Date: Sun, 10 Apr 2022 07:54:15 GMT Content-Type: text/plain Content-Length: 2008 Last-Modified: Fri, 08 Apr 2022 07:37:12 GMT Connection: keep-alive ETag: "624fe628-7d8" Accept-Ranges: bytes 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, _SubStr = , ret_val_out = FQdlCO+AM25vA7DCaHgvXG8RG8wuFPj5ce35YBzdCkX4uTUFLhriHtu/Oi+UWJr4ZhL0V98C+J1oSUVvj04vZpOlpNaUS9xq32c5ytzGCzS/nghLiCKxCZzOWbuqSj0VH/+OAimTeFkmPVMIlH/c/0nKqrtkyaXm+SnGKLlT9E7odjcqbgb2f0DpCq5MqxVIvGta+gRxI5YtK0faM7SxHCXpiAzfTe59M/nPHe7/zopwYMOO5+5uJMv6wVFKoen2q1FSxtWtIJEUHoKNJKzhvKoNzCvEtyPFPBa84OtgXnIEq06KVlic2ZdgKZWPJZTZY83i/o09zB4CiWBTrnzYd3/pGEZQFiOpCkbbly3Z59N2byuvjp6d+ioPy9PESDRKGxI0YWiyq9vEsf0+rr09KsWidQssB5hfFHcdxPCkeM/+kvepXMKaeC7IqmxDY/FuCxNfSM3/4GTmjPLhBKtApqwpILgUYmZaS4aAW4Qz2lbnKc61vAjkVYYz0r6gxmuAkPwWxnHLE7YySS1SX1e/repZPug/Q7n/tvxMRdc/e0p2JBc/BpgCHnslJfbMjoKdynj7oGI9D2TVq13iJErDGG8RG8wuFPj5ce35YBzdCkV/dW/b5utmUPjirEhBXg4EHVVkgYWTELTH+XvtJ4xS2grG5f6f8ldj+RWRZaVfVN3S9Fm7jcFxzmwnHfHqoCSBU8hpmEddZozAPocBu/9L0gKzHmU6rBVK4HKnnoXCA11blSGZzdLN0zGXMZ25w7ghiZdUIFe4RxCk/nJXvMo5y46JVXNDYI/lE/WWrgdnRyy3S/jULnHZy8pRl6rssNgEwtXA/4yMOrWtAIEVJ7GnelPIaZhHXWaMwD6HAbv/S9IXANy3iD2f+zZPPWS9UKXIbxEbzC4U+Plx7flgHN0KRd6sVUkPtXpvAKW1+cqijr/ZiOZpMNvhlWgs5kj+dMXAPjdrHHPSvRVa24eEwmN+JBxP4iQNtw7lYMqxUcgTeICNdwmXI1eInCsyiUuzhZdoLFDYFJeQNZ8jHvTu/lXH2nUCUqgQcarMFqiFw+cs3VH3AsRxvSxVxlw1N6Jy3lV6V1LK1Jym6XWopr8fbr3fW8Wb5tSexZaCU+RRLSAR4BjggEn5vqe53R442LxGNRkDIiZKoWm8LohL6qQC9r8gwKNp4nSX5pUE4XFi3Kzs2MS1K0q9SlTM1Rny7w844QItzoYiWC5svj8p5sBy5gyLXeVFGtyMTFM59i6o/eRRiVMKjaZ3PdM1AQmF7LlBLlzqWgTyNq08Rm0CHO2B3jb8NXbxI/8Gcyv79PjucuMvahS018yb5k+A/d1kTijF9ltQ97yuqy5NCWeEVoLWi5+TFwRM9XwN243TfMBxdEOxzGUdik4ElqmpBOL2XoFZOUWrp8HoZsM4Czs8DB2szNJ8sjOvc1wT+bssN0jnORgCRu4ALixL6fD4h5/RiiGQ3hzDK/e9SwP/NVq0K/3a/W+LWlWvIMK2gmrT19SpCXs3bhrZE/ONxfzF5XI09qDOfrmsSuX+KHS4UbKo+pMWOLO1rdykgybx0rvJPOKBZQB/YWIKZpHVCt59DRnAdlh9EU73SVUm9lt6XqQRCpRCyCIgE+9A+SP4w9gGCIdjaGt1JFzfjk8rXJ47L9K64FjP678r440zwHledrCpbqC1EpllI1xb/QflRCPqo1io1yHTH7FsMUoHFPOwoChp3f4GKPeR3HWHzbuWzAVu9APy91S+5nOFp/UilrTGduL4CuJjqRh+s61t3GCld6OYtfxiFfCrO9ZYyd9cjh/VbnO3UiOr8v1c+ugLSE4FW6ZNew1fn0f1CBlPDBksqrD2eQFCJa1MXM13hQWMJud+E/7sFOge8fLxG+w1kTz+5zw3QC5OiNmuEhnT3iGnchR5eAAtHdUGZ9VLCU14OpmB2go2nnx8nz43axxz0r0VWtuHhMJjfiTmEZVhWU9b30Wcar3ZMHeZ39qY9MpWyGVisueCMa60fA==
ExFreePoolWithTag P_ptr = 0xffffe0003a7a5000, Tag = 0x48545450
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd000292aa4e0
MmIsAddressValid VirtualAddress_ptr = 0xffffe0004c9e7d00, ret_val_out = 1
MmIsAddressValid VirtualAddress_ptr = 0xffffe0003a4beb50, ret_val_out = 1
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0004c9e7d00, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0xffffd000292aa4e0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000292aa4d0, ret_val_unk_out = 0xffffe0003c7061b0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x10, Tag = 0x54444953, ret_val_ptr_out = 0xffffe0003c634250
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c7061b0, Irp_unk_out = 0xffffe0003c7061b0, ret_val_out = 0x103
KeSetEvent Event_unk = 0xffffd000292aa4e0, Increment_unk = 0x0, Wait = 0, Event_unk_out = 0xffffd000292aa4e0, ret_val_out = 0
KeWaitForMutexObject ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634250, Tag = 0x54444953
ZwClose Handle_unk = 0xffffffff80000ffc, ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd000292aa060
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd000292a9fd0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80001060
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b66dc, SpinLock_unk_out = 0xffffe0003a7b66dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b66dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b66dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b66dc, SpinLock_unk_out = 0xffffe0003a7b66dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b66dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b66dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af7df50, Tag = 0x54444953
ExFreePoolWithTag P_ptr = 0xffffe0003b098f40, Tag = 0x54444953
ExFreePoolWithTag P_ptr = 0xffffe00040932cf0, Tag = 0x54444953
ObfDereferenceObject Object_ptr = 0xffffe0003a4beb50, ret_val_ptr_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
MmAllocatePagesForMdl LowAddress_unk = 0x0, HighAddress_unk = 0xffffffffffffffff, SkipBytes_unk = 0x0, TotalBytes_ptr = 0x7d9, ret_val_unk_out = 0xffffe0003c261580
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c261580, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a4e6000
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c261580, AccessMode_unk = 0x1, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x20, ret_val_ptr_out = 0x4e0000
ExFreePoolWithTag P_ptr = 0xffffe0003a779010, Tag = 0x0
IoCompleteRequest ret_val_out = 0x0
Execution Path #89 (length: 6, count: 2, processes: 1)
»
Information Value
Sequence Length 6
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 2
Sequence
»
Symbol Parameters
MmIsAddressValid VirtualAddress_ptr = 0xffffd0002a4e6000, ret_val_out = 1
MmUnmapLockedPages BaseAddress_ptr = 0x4e0000, MemoryDescriptorList_unk = 0xffffe0003c261580
MmUnmapLockedPages BaseAddress_ptr = 0xffffd0002a4e6000, MemoryDescriptorList_unk = 0xffffe0003c261580
MmFreePagesFromMdl MemoryDescriptorList_unk = 0xffffe0003c261580
IoFreeMdl Mdl_unk = 0xffffe0003c261580
IoCompleteRequest ret_val_out = 0x0
Execution Path #90 (length: 15, count: 1, processes: 1)
»
Information Value
Sequence Length 15
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b8fbc110
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000ba1495b0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b8567010
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b91041c0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b8e43d00
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b83dbbe0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b90dee10
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b9323ef0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b74c7950
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b9ddc890
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b9f0c360
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000ba12f220
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b7ebdef0
ExAllocatePool PoolType_unk = 0x1, NumberOfBytes_ptr = 0x104, ret_val_ptr_out = 0xffffc000b7afe8d0
IoCompleteRequest ret_val_out = 0x0
Execution Path #91 (length: 13, count: 11, processes: 1)
»
Information Value
Sequence Length 13
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 11
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bd56930, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xfffff80000000010, ret_val_ptr_out = 0xffffd0002a699e38
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1c5, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77e010
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77e0f4, Length = 0xdd, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7881bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x0
IoAllocateIrp StackSize = 3, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003c839cf0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7881bc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0, Irp_unk_out = 0xffffe0003c839cf0, ret_val_out = 0x103
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #95 (length: 27, count: 28, processes: 1)
»
Information Value
Sequence Length 27
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 28
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a87de38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20e8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77f000
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77f0e4, Length = 0x2000, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe000487ed580
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe000487ed580, MemoryDescriptorList_unk_out = 0xffffe000487ed580
IoAllocateIrp StackSize = 3, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003c839cf0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7881bc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c839cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7881bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoFreeIrp Irp_unk = 0xffffe0003c839cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #97 (length: 15, count: 13, processes: 1)
»
Information Value
Sequence Length 15
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 13
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a87eef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1f0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c1f8, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8, ret_val_out = 1
IoFreeMdl Mdl_unk = 0xffffe000487ed580
ExFreePoolWithTag P_ptr = 0xffffe0003a77f000, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #98 (length: 12, count: 9, processes: 1)
»
Information Value
Sequence Length 12
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 9
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002a891e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7881bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #187 (length: 89, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 89
Processes
»
Process Count
Process 42 (iexplore.exe, PID: 556) 1
Sequence
»
Symbol Parameters
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000d00, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00035626c18, Object_out = 0xffffe0003c4b7cd0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObfDereferenceObject Object_ptr = 0xffffe0003c4b7cd0, ret_val_ptr_out = 0x7fff
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x28, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a782560
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c84acf0, Irp_unk_out = 0xffffe0003c84acf0, ret_val_out = 0x103
PsGetCurrentProcessId ret_val_unk_out = 0x22c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77c010
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x22c, Process_unk_out = 0xffffd00035626540, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003bf66080, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd000356264f8, Handle_out = 0xffffffff80000cfc, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cfc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd000356264f0, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x9a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af83ef0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cfc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x9a, ProcessInformation_ptr_out = 0xffffe0003af83ef0, ReturnLength_ptr_out = 0xffffd000356264f0, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000cfc, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003bf66080, ret_val_ptr_out = 0x380f1
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Program Files\Internet Explorer\iexplore.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af83ef0, Tag = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77c18c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003a4ae280
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c439c20, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd00035626340, ret_val_unk_out = 0xffffe0003b4669f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003a4ae280, MemoryDescriptorList_unk_out = 0xffffe0003a4ae280
IofCallDriver DeviceObject_unk = 0xffffe0003c439c20, Irp_unk = 0xffffe0003b4669f0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b4669f0, Irp_unk_out = 0xffffe0003b4669f0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003a4ae280
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77c464, SpinLock_unk_out = 0xffffe0003a77c464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77c464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77c464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77c464, SpinLock_unk_out = 0xffffe0003a77c464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77c464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77c464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77c464, SpinLock_unk_out = 0xffffe0003a77c464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77c464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77c464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77c464, SpinLock_unk_out = 0xffffe0003a77c464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77c464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77c464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77c464, SpinLock_unk_out = 0xffffe0003a77c464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77c464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77c464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1c7, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77e010
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObReferenceObjectByHandle Handle_unk = 0xffffffff80000cfc, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00035626c18, Object_out = 0xffffe0003aeb99c0, HandleInformation_unk_out = 0x0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ObfDereferenceObject Object_ptr = 0xffffe0003aeb99c0, ret_val_ptr_out = 0x7fff
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x28, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af83eb0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7c9cf0, Irp_unk_out = 0xffffe0003b7c9cf0, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b16dc, SpinLock_unk_out = 0xffffe0003a7b16dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b16dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b16dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
Execution Path #102 (length: 18, count: 1, processes: 1)
»
Information Value
Sequence Length 18
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003bcb2440, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002af4bef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1c8, SpinLock_unk_out = 0xfffff800fc55c1c8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1c8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1c8
KeSetTimer Timer_unk = 0xfffff800fc55c130, DueTime_unk = 0x0, Dpc_unk = 0xfffff800fc55c170, Timer_unk_out = 0xfffff800fc55c130, ret_val_out = 0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1c8, SpinLock_unk_out = 0xfffff800fc55c1c8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1c8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1c8
KeSetTimer Timer_unk = 0xfffff800fc55c130, DueTime_unk = 0x0, Dpc_unk = 0xfffff800fc55c170, Timer_unk_out = 0xfffff800fc55c130, ret_val_out = 0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #105 (length: 26, count: 1, processes: 1)
»
Information Value
Sequence Length 26
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1fc4c0, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002b8d6ef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #108 (length: 14, count: 26, processes: 1)
»
Information Value
Sequence Length 14
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 26
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003b491560, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002be4ce38
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x648, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a773010
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a7730f4, Length = 0x560, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ae8ba10
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ae8ba10, MemoryDescriptorList_unk_out = 0xffffe0003ae8ba10
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1f0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c1f8, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7881bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #109 (length: 22, count: 17, processes: 1)
»
Information Value
Sequence Length 22
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 17
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c1fc4c0, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002be4de38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7881bc
AfdBReceiveEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003ae8ba10
ExFreePoolWithTag P_ptr = 0xffffe0003a773010, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #126 (length: 9, count: 2, processes: 1)
»
Information Value
Sequence Length 9
Processes
»
Process Count
Process 42 (iexplore.exe, PID: 556) 2
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
Execution Path #127 (length: 50, count: 2, processes: 1)
»
Information Value
Sequence Length 50
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 2
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c58d010, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c5a7e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20e8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77f000
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77f0e4, Length = 0x2000, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003e5f5550
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003e5f5550, MemoryDescriptorList_unk_out = 0xffffe0003e5f5550
IoAllocateIrp StackSize = 3, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003c831cf0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoFreeIrp Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20e8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77f000
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77f0e4, Length = 0x2000, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
IoAllocateIrp StackSize = 3, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003c831cf0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoFreeIrp Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #128 (length: 4, count: 9, processes: 1)
»
Information Value
Sequence Length 4
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 9
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c58d010, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c5abe38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #130 (length: 48, count: 1, processes: 1)
»
Information Value
Sequence Length 48
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c58d010, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c5b0e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20e8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77f000
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77f0e4, Length = 0x2000, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
IoAllocateIrp StackSize = 3, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003c831cf0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoFreeIrp Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77c464, SpinLock_unk_out = 0xffffe0003a77c464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77c464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77c464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1f0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c1f8, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #131 (length: 17, count: 1, processes: 1)
»
Information Value
Sequence Length 17
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c58d010, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c5b1ef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1f0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c1f8, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8, ret_val_out = 1
IoFreeMdl Mdl_unk = 0xffffe00044551330
ExFreePoolWithTag P_ptr = 0xffffe0003a77f000, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #132 (length: 17, count: 18, processes: 1)
»
Information Value
Sequence Length 17
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 18
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c58d010, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c5b4ef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1f0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c1f8, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8, ret_val_out = 1
IoFreeMdl Mdl_unk = 0xffffe00044551330
ExFreePoolWithTag P_ptr = 0xffffe0003a77f000, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #134 (length: 58, count: 1, processes: 1)
»
Information Value
Sequence Length 58
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003e5f5550, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xfffff80000000010, ret_val_ptr_out = 0xffffd0002c624e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20e8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77f000
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77f0e4, Length = 0x2000, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
IoAllocateIrp StackSize = 3, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003c831cf0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoFreeIrp Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20e8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77f000
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77f0e4, Length = 0x2000, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
IoAllocateIrp StackSize = 3, ChargeQuota = 0, ret_val_unk_out = 0xffffe0003c831cf0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoFreeIrp Irp_unk = 0xffffe0003c831cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #135 (length: 16, count: 14, processes: 1)
»
Information Value
Sequence Length 16
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 14
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xfffff80000000010, ret_val_ptr_out = 0xffffd0002c675e38
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20e8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77f000
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77f0e4, Length = 0x2000, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003be355f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003be355f0, MemoryDescriptorList_unk_out = 0xffffe0003be355f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1f0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c1f8, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003be355f0
ExFreePoolWithTag P_ptr = 0xffffe0003a77f000, Tag = 0x0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #137 (length: 17, count: 4, processes: 1)
»
Information Value
Sequence Length 17
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 4
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c58d010, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0xfffff80000000010, ret_val_ptr_out = 0xffffd0002c681e38
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x4106, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003afb5000
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003afb50e4, Length = 0x401e, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe00044551330
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe00044551330, MemoryDescriptorList_unk_out = 0xffffe00044551330
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x3f, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a774fc0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1f0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c1f8, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe00044551330
ExFreePoolWithTag P_ptr = 0xffffe0003afb5000, Tag = 0x0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #138 (length: 61, count: 1, processes: 1)
»
Information Value
Sequence Length 61
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c684e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
AfdBReceiveEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003e5f5550
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #139 (length: 48, count: 2, processes: 1)
»
Information Value
Sequence Length 48
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 2
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003c58d010, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c6b6e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
AfdBReceiveEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003e5f5550
ExFreePoolWithTag P_ptr = 0xffffe0003a7664d0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #140 (length: 20, count: 1, processes: 1)
»
Information Value
Sequence Length 20
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003e5f5550, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c708ef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #141 (length: 100, count: 1, processes: 1)
»
Information Value
Sequence Length 100
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003e5f5550, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c711e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
AfdBReceiveEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
IoFreeMdl Mdl_unk = 0xffffe00044551330
ExFreePoolWithTag P_ptr = 0xffffe0003afb5000, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #142 (length: 35, count: 1, processes: 1)
»
Information Value
Sequence Length 35
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c750e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
AfdBReceiveEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
IoFreeMdl Mdl_unk = 0xffffe00044551330
ExFreePoolWithTag P_ptr = 0xffffe0003afb5000, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #143 (length: 31, count: 1, processes: 1)
»
Information Value
Sequence Length 31
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c751ef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
ExFreePoolWithTag P_ptr = 0xffffe0003a774fc0, Tag = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
ExFreePoolWithTag P_ptr = 0xffffe0003a774f20, Tag = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
ExFreePoolWithTag P_ptr = 0xffffe0003a788250, Tag = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #144 (length: 16, count: 3, processes: 1)
»
Information Value
Sequence Length 16
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 3
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c79eef8
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x60900
Execution Path #145 (length: 74, count: 1, processes: 1)
»
Information Value
Sequence Length 74
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c84be38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
AfdBReceiveEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
IoFreeMdl Mdl_unk = 0xffffe00044551330
ExFreePoolWithTag P_ptr = 0xffffe0003c8ca000, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #146 (length: 21, count: 1, processes: 1)
»
Information Value
Sequence Length 21
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe00044551330, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002d05ee38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b16dc, SpinLock_unk_out = 0xffffe0003a7b16dc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b16dc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7b16dc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b16dc, SpinLock_unk_out = 0xffffe0003a7b16dc, ret_val_unk_out = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003e5f5550
ExFreePoolWithTag P_ptr = 0xffffe0003a788920, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b16dc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #154 (length: 30, count: 1, processes: 1)
»
Information Value
Sequence Length 30
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe0003be355f0, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002e452e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7881bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a7881bc
AfdBReceiveEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x0
IoFreeMdl Mdl_unk = 0xffffe000473be010
ExFreePoolWithTag P_ptr = 0xffffe0003a765010, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00
Execution Path #171 (length: 26, count: 1, processes: 1)
»
Information Value
Sequence Length 26
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
MmMapLockedPagesSpecifyCache MemoryDescriptorList_unk = 0xffffe000473be010, AccessMode_unk = 0x0, CacheType_unk = 0x1, BaseAddress_ptr = 0x0, BugCheckOnFailure = 0x0, Priority_unk = 0x10, ret_val_ptr_out = 0xffffd0002c793e38
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
ExFreePoolWithTag P_ptr = 0xffffe0003a763f10, Tag = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a77e1bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c1f0
IoCompleteRequest ret_val_out = 0x60a00

Kernel Graph 10

Kernel Graph

Kernel Graph Legend
Code Block #14 (EP #12)
»
Information Value
Trigger Iru.sys+0x2cf1f6
Start Address 0xfffff800416f78b0
Execution Path #12 (length: 1, count: 52, processes: 4)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 2
Process 7 (svchost.exe, PID: 888) 2
Process 2 (System, PID: 4) 46
Process 16 (officeclicktorun.exe, PID: 1740) 2
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0

Kernel Graph 11

Kernel Graph

Kernel Graph Legend
Code Block #15 (EP #13)
»
Information Value
Trigger Iru.sys+0x2c293e
Start Address 0xfffff800416f6a00
Execution Path #13 (length: 1, count: 52, processes: 4)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 2
Process 7 (svchost.exe, PID: 888) 2
Process 2 (System, PID: 4) 46
Process 16 (officeclicktorun.exe, PID: 1740) 2
Sequence
»
Symbol Parameters
KeReleaseSpinLock SpinLock_unk = * (e.g. 0xffffe0003a763d44), NewIrql_unk = * (e.g. 0x2), SpinLock_unk_out = * (e.g. 0xffffe0003a763d44)

Kernel Graph 12

Kernel Graph

Kernel Graph Legend
Code Block #16 (EP #14, #16, #20, #22, #30, #29, #184, #76, #32, #86, #185, #186, #149)
»
Information Value
Trigger Iru.sys+0x2cb5a2
Start Address 0xfffff800416d3c80
Execution Path #14 (length: 20, count: 1, processes: 1)
»
Information Value
Sequence Length 20
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #16 (length: 76, count: 1, processes: 1)
»
Information Value
Sequence Length 76
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a769930
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80001064, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001064, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80001064, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80001064, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x48009
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a769aac, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c16ac10
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003c831cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c16ac10, MemoryDescriptorList_unk_out = 0xffffe0003c16ac10
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003c831cf0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c831cf0, Irp_unk_out = 0xffffe0003c831cf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003c16ac10
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7694b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002d562570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002d562528, Handle_out = 0xffffffff80000a88, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000a88, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000a88, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002d562520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000a88, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x48008
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76962c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c16ac10
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002d562370, ret_val_unk_out = 0xffffe0003c831cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c16ac10, MemoryDescriptorList_unk_out = 0xffffe0003c16ac10
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003c831cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c831cf0, Irp_unk_out = 0xffffe0003c831cf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003c16ac10
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003be10400
PsGetProcessImageFileName ret_val_out = 0xffffe0003be10850
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #20 (length: 8, count: 5, processes: 3)
»
Information Value
Sequence Length 8
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 1
Process 2 (System, PID: 4) 3
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #22 (length: 6, count: 2, processes: 2)
»
Information Value
Sequence Length 6
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 1
Process 11 (svchost.exe, PID: 324) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bd9b5c0
PsGetProcessImageFileName ret_val_out = 0xffffe0003bd9ba10
_stricmp _Str1 = svchost.exe, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #30 (length: 81, count: 1, processes: 1)
»
Information Value
Sequence Length 81
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002fd90570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002fd90528, Handle_out = 0xffffffff800010b0, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff800010b0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002fd90520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff800010b0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002fd90520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff800010b0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x48000
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76fd0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1303b0
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002fd90370, ret_val_unk_out = 0xffffe0003c84acf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1303b0, MemoryDescriptorList_unk_out = 0xffffe0003c1303b0
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003c84acf0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c84acf0, Irp_unk_out = 0xffffe0003c84acf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003c1303b0
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002fd90570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002fd90528, Handle_out = 0xffffffff80000fe8, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000fe8, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002fd90520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000fe8, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002fd90520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000fe8, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47fff
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a769aac, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1303b0
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002fd90370, ret_val_unk_out = 0xffffe0003c84acf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1303b0, MemoryDescriptorList_unk_out = 0xffffe0003c1303b0
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003c84acf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c84acf0, Irp_unk_out = 0xffffe0003c84acf0, ret_val_out = 0x103
IoFreeMdl Mdl_unk = 0xffffe0003c1303b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #29 (length: 1, count: 8, processes: 3)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 2 (System, PID: 4) 6
Process 16 (officeclicktorun.exe, PID: 1740) 1
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b76bcf0, Irp_unk_out = 0xffffe0003b76bcf0, ret_val_out = 0x103
Execution Path #184 (length: 109, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 109
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002fd90570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002fd90528, Handle_out = 0xffffffff80000b84, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000b84, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002fd90520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000b84, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002fd90520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000b84, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffa
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a763a6c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9bd520
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002fd90370, ret_val_unk_out = 0xffffe0003b7c9cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9bd520, MemoryDescriptorList_unk_out = 0xffffe0003b9bd520
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003b7c9cf0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b7c9cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003b9bd520
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002fd90570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002fd90528, Handle_out = 0xffffffff80000bbc, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000bbc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002fd90520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000bbc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002fd90520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000bbc, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ff9
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76618c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9bd520
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002fd90370, ret_val_unk_out = 0xffffe0003b7c9cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9bd520, MemoryDescriptorList_unk_out = 0xffffe0003b9bd520
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003b7c9cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b7c9cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003b9bd520
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c564590, Irp_unk_out = 0xffffe0003c564590, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
Execution Path #76 (length: 143, count: 1, processes: 1)
»
Information Value
Sequence Length 143
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002c852570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002c852528, Handle_out = 0xffffffff800010a0, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff800010a0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff800010a0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff800010a0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffe
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76fd0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f1250
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002c852370, ret_val_unk_out = 0xffffe0003c83f8f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f1250, MemoryDescriptorList_unk_out = 0xffffe0003c1f1250
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003c83f8f0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c83f8f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c1f1250
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002c852570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002c852528, Handle_out = 0xffffffff80000cbc, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cbc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cbc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000cbc, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ffd
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a769aac, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c1f1250
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002c852370, ret_val_unk_out = 0xffffe0003c83f8f0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c1f1250, MemoryDescriptorList_unk_out = 0xffffe0003c1f1250
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003c83f8f0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c83f8f0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c1f1250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #32 (length: 17, count: 1, processes: 1)
»
Information Value
Sequence Length 17
Processes
»
Process Count
Process 16 (officeclicktorun.exe, PID: 1740) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
Execution Path #86 (length: 93, count: 1, processes: 1)
»
Information Value
Sequence Length 93
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c634710
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd000339f4570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd000339f4528, Handle_out = 0xffffffff80000cac, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cac, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd000339f4520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cac, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd000339f4520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000cac, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ff9
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003c63488c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000339f4370, ret_val_unk_out = 0xffffe0003b7c9cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003b7c9cf0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b7c9cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c306640
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x467, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7b6010
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd000339f4570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd000339f4528, Handle_out = 0xffffffff80000d68, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000d68, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd000339f4520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000d68, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd000339f4520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000d68, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ff8
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a7b618c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000339f4370, ret_val_unk_out = 0xffffe0003b7c9cf0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003b7c9cf0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b7c9cf0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c306640
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #185 (length: 223, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 223
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b182010, Irp_unk_out = 0xffffe0003b182010, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002c852570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002c852528, Handle_out = 0xffffffff80000cbc, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cbc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cbc, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000cbc, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ff6
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a763a6c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002c852370, ret_val_unk_out = 0xffffe0003c8359e0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003c8359e0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c8359e0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c306640
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002c852570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002c852528, Handle_out = 0xffffffff800010a0, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff800010a0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff800010a0, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff800010a0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47ff5
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76618c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003c306640
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002c852370, ret_val_unk_out = 0xffffe0003c8359e0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003c306640, MemoryDescriptorList_unk_out = 0xffffe0003c306640
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003c8359e0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c8359e0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003c306640
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c5f7410
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002c852570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002c852528, Handle_out = 0xffffffff80000c80, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000c80, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000c80, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000c80, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47fe8
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a779d0c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002c852370, ret_val_unk_out = 0xffffe0003b7a1ad0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003b7a1ad0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b7a1ad0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd0002c852570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd0002c852528, Handle_out = 0xffffffff80000ff8, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000ff8, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000ff8, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd0002c852520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000ff8, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47fe7
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a78841c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003ee71f40
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd0002c852370, ret_val_unk_out = 0xffffe0003b7a1ad0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003ee71f40, MemoryDescriptorList_unk_out = 0xffffe0003ee71f40
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003b7a1ad0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b7a1ad0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003ee71f40
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b0c28d0, Irp_unk_out = 0xffffe0003b0c28d0, ret_val_out = 0x103
Execution Path #186 (length: 171, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 171
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003f81ed90, Irp_unk_out = 0xffffe0003f81ed90, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c80d010, Irp_unk_out = 0xffffe0003c80d010, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c634b64, SpinLock_unk_out = 0xffffe0003c634b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c634b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c634b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6464, SpinLock_unk_out = 0xffffe0003a7b6464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd000339f4570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd000339f4528, Handle_out = 0xffffffff80000cc4, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cc4, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd000339f4520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000cc4, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd000339f4520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000cc4, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47fec
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a763a6c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003c697cd0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000339f4370, ret_val_unk_out = 0xffffe0003c8399d0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
IofCallDriver DeviceObject_unk = 0xffffe0003c697cd0, Irp_unk = 0xffffe0003c8399d0
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c8399d0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
PsGetCurrentProcessId ret_val_unk_out = 0x41c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
PsLookupProcessByProcessId ProcessId_unk = 0x41c, Process_unk_out = 0xffffd000339f4570, ret_val_out = 0x0
ObOpenObjectByPointer Object_ptr = 0xffffe0003be10400, HandleAttributes = 0x200, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0x0, AccessMode_unk = 0xfffff80041aa4800, Handle_ptr_out = 0xffffd000339f4528, Handle_out = 0xffffffff80000c80, ret_val_out = 0x0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000c80, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd000339f4520, ret_val_out = 0xc0000004
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x7a, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003c6341c0
ZwQueryInformationProcess ProcessHandle_unk = 0xffffffff80000c80, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x7a, ProcessInformation_ptr_out = 0xffffe0003c6341c0, ReturnLength_ptr_out = 0xffffd000339f4520, ret_val_out = 0x0
ZwClose Handle_unk = 0xffffffff80000c80, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003be10400, ret_val_ptr_out = 0x47feb
RtlDowncaseUnicodeString DestinationString = , SourceString = \Device\HarddiskVolume1\Windows\System32\svchost.exe, AllocateDestinationString = 0, ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c6341c0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a76618c, Length = 0x55, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b4458b0
IoBuildDeviceIoControlRequest IoControlCode = 0x3, DeviceObject_unk = 0xffffe0003ae849a0, InputBuffer_ptr = 0x0, InputBufferLength = 0x0, OutputBufferLength = 0x0, InternalDeviceIoControl = 1, Event_unk = 0x0, OutputBuffer_ptr_out = 0x0, IoStatusBlock_unk_out = 0xffffd000339f4370, ret_val_unk_out = 0xffffe0003c8399d0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b4458b0, MemoryDescriptorList_unk_out = 0xffffe0003b4458b0
IofCallDriver DeviceObject_unk = 0xffffe0003ae849a0, Irp_unk = 0xffffe0003c8399d0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c8399d0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
IoFreeMdl Mdl_unk = 0xffffe0003b4458b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0004ece08d0, Irp_unk_out = 0xffffe0004ece08d0, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a779fe4, SpinLock_unk_out = 0xffffe0003a779fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a779fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a779fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7886f4, SpinLock_unk_out = 0xffffe0003a7886f4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7886f4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7886f4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
TdiMapUserRequest ret_val_out = 0xc0000002
Execution Path #149 (length: 18, count: 1, processes: 1)
»
Information Value
Sequence Length 18
Processes
»
Process Count
Process 42 (iexplore.exe, PID: 556) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0

Kernel Graph 13

Kernel Graph

Kernel Graph Legend
Code Block #20 (EP #21, #45)
»
Information Value
Trigger _guard_dispatch_icall_nop
Start Address 0xfffff800fc2c7930
Execution Path #21 (length: 5, count: 2, processes: 2)
»
Information Value
Sequence Length 5
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 1
Process 10 (svchost.exe, PID: 1000) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a76ffe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdReceiveDatagramEventHandler ret_val_out = 0x0
Execution Path #45 (length: 9, count: 10, processes: 2)
»
Information Value
Sequence Length 9
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 6
Process 2 (System, PID: 4) 4
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a766464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0a8, SpinLock_unk_out = 0xfffff800fc55c0a8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0a8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0a8
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdReceiveDatagramEventHandler ret_val_out = 0x0

Kernel Graph 14

Kernel Graph

Kernel Graph Legend
Code Block #21 (EP #26)
»
Information Value
Trigger Iru.sys+0x2b1ff6
Start Address 0xfffff800f91110d0
Execution Path #26 (length: 1, count: 4, processes: 2)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 3
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
TdiMapUserRequest ret_val_out = 0xc0000002

Kernel Graph 15

Kernel Graph

Kernel Graph Legend
Code Block #22 (EP #28)
»
Information Value
Trigger Iru.sys+0x2ca50a
Start Address 0xfffff800416d95a0
Execution Path #28 (length: 1, count: 9, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 2 (System, PID: 4) 9
Sequence
»
Symbol Parameters
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d296eb0

Kernel Graph 16

Kernel Graph

Kernel Graph Legend
Code Block #23 (EP #42, #110)
»
Information Value
Trigger Iru.sys+0x1d8b
Start Address 0xfffff80041a69880
Execution Path #42 (length: 36, count: 1, processes: 1)
»
Information Value
Sequence Length 36
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d296eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a769904
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a769904
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b76bcf0, Irp_unk_out = 0xffffe0003b76bcf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d296eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d296eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x103
Execution Path #110 (length: 40, count: 1, processes: 1)
»
Information Value
Sequence Length 40
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002ed2a640
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003c84dcf0, Irp_unk_out = 0xffffe0003c84dcf0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002ed2a640
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003c84dcf0, Irp_unk_out = 0xffffe0003c84dcf0, ret_val_out = 0x103

Kernel Graph 17

Kernel Graph

Kernel Graph Legend
Code Block #24 (EP #33, #47, #92)
»
Information Value
Trigger _guard_dispatch_icall_nop
Start Address 0xfffff800fc2c49f0
Execution Path #33 (length: 5, count: 3, processes: 2)
»
Information Value
Sequence Length 5
Processes
»
Process Count
Process 2 (System, PID: 4) 2
Process 10 (svchost.exe, PID: 1000) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdBReceiveEventHandler ret_val_out = 0xc0000016
Execution Path #47 (length: 9, count: 10, processes: 3)
»
Information Value
Sequence Length 9
Processes
»
Process Count
Process 11 (svchost.exe, PID: 324) 1
Process 2 (System, PID: 4) 6
Process 25 (winlogon.exe, PID: 508) 3
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7858ac, SpinLock_unk_out = 0xffffe0003a7858ac, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7858ac, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7858ac
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdBReceiveEventHandler ret_val_out = 0x0
Execution Path #92 (length: 13, count: 11, processes: 4)
»
Information Value
Sequence Length 13
Processes
»
Process Count
Process 24 (csrss.exe, PID: 456) 2
Process 2 (System, PID: 4) 7
Process 30 (explorer.exe, PID: 1184) 1
Process 21 (smss.exe, PID: 300) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a782464, SpinLock_unk_out = 0xffffe0003a782464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a782464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a782464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1f0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c1f8, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7881bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0

Kernel Graph 18

Kernel Graph

Kernel Graph Legend
Code Block #25 (EP #34)
»
Information Value
Trigger Iru.sys+0x14bdf
Start Address 0xfffff800f8856f70
Execution Path #34 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 7 (svchost.exe, PID: 888) 1
Sequence
»
Symbol Parameters
AfdBReceiveEventHandler ret_val_out = 0x0

Kernel Graph 19

Kernel Graph

Kernel Graph Legend
Code Block #27 (EP #39)
»
Information Value
Trigger Iru.sys+0x2b9c17
Start Address 0xfffff800416fbdd0
Execution Path #39 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
PsIsThreadTerminating Thread_unk = 0xffffe0003bc545c0, ret_val_out = 0

Kernel Graph 20

Kernel Graph

Kernel Graph Legend
Code Block #28 (EP #40)
»
Information Value
Trigger Iru.sys+0x2ba442
Start Address 0xfffff8004174d180
Execution Path #40 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
PsGetCurrentProcessWow64Process ret_val_out = 0x0

Kernel Graph 21

Kernel Graph

Kernel Graph Legend
Code Block #29 (EP #41, #115)
»
Information Value
Trigger Iru.sys+0x2b3e79
Start Address 0xfffff800418b4000
Execution Path #41 (length: 12, count: 1, processes: 1)
»
Information Value
Sequence Length 12
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003bc53300
PsGetProcessImageFileName ret_val_out = 0xffffe0003bc53750
_stricmp _Str1 = winlogon.exe, _Str2 = winlogon.exe, ret_val_out = 0
Execution Path #115 (length: 1, count: 6, processes: 3)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 2
Process 25 (winlogon.exe, PID: 508) 1
Process 16 (officeclicktorun.exe, PID: 1740) 3
Sequence
»
Symbol Parameters
ExFreePoolWithTag P_ptr = 0xffffe0003af95f60, Tag = 0x0

Kernel Graph 22

Kernel Graph

Kernel Graph Legend
Code Block #30 (EP #44, #58, #79, #84, #129, #133, #172)
»
Information Value
Trigger KiExecuteAllDpcs+0x26c
Start Address 0xfffff800fc2b6e90
Execution Path #44 (length: 4, count: 98, processes: 6)
»
Information Value
Sequence Length 4
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 7
Process 2 (System, PID: 4) 19
Process 25 (winlogon.exe, PID: 508) 68
Process 24 (csrss.exe, PID: 456) 1
Process 27 (dwm.exe, PID: 784) 1
Process 42 (iexplore.exe, PID: 556) 2
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #58 (length: 11, count: 63, processes: 4)
»
Information Value
Sequence Length 11
Processes
»
Process Count
Process 12 (svchost.exe, PID: 1052) 15
Process 2 (System, PID: 4) 36
Process 25 (winlogon.exe, PID: 508) 11
Process 27 (dwm.exe, PID: 784) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x1
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #79 (length: 17, count: 5, processes: 3)
»
Information Value
Sequence Length 17
Processes
»
Process Count
Process 16 (officeclicktorun.exe, PID: 1740) 1
Process 42 (iexplore.exe, PID: 556) 3
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1c8, SpinLock_unk_out = 0xfffff800fc55c1c8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1c8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1c8
KeSetTimer Timer_unk = 0xfffff800fc55c130, DueTime_unk = 0x0, Dpc_unk = 0xfffff800fc55c170, Timer_unk_out = 0xfffff800fc55c130, ret_val_out = 0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x1
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1c8, SpinLock_unk_out = 0xfffff800fc55c1c8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1c8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1c8
IoCompleteRequest ret_val_out = 0xc0000016
Execution Path #84 (length: 13, count: 9, processes: 4)
»
Information Value
Sequence Length 13
Processes
»
Process Count
Process 2 (System, PID: 4) 5
Process 24 (csrss.exe, PID: 456) 2
Process 30 (explorer.exe, PID: 1184) 1
Process 21 (smss.exe, PID: 300) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x4bfd7
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #129 (length: 14, count: 1, processes: 1)
»
Information Value
Sequence Length 14
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x3f, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77c4c0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #133 (length: 27, count: 3, processes: 1)
»
Information Value
Sequence Length 27
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 3
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1f0, SpinLock_unk_out = 0xfffff800fc55c1f0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1f0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1f0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c1f8, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c1f8, ret_val_out = 1
IoFreeMdl Mdl_unk = 0xffffe0003e5f5550
ExFreePoolWithTag P_ptr = 0xffffe0003a77f000, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x3fd3
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #172 (length: 13, count: 1, processes: 1)
»
Information Value
Sequence Length 13
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
IoFreeMdl Mdl_unk = 0xffffe0003b9d74c0
ExFreePoolWithTag P_ptr = 0xffffe0003a77f000, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x1
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0

Kernel Graph 23

Kernel Graph

Kernel Graph Legend
Code Block #31 (EP #61)
»
Information Value
Trigger Iru.sys+0x2cb47f
Start Address 0xfffff800416d5150
Execution Path #61 (length: 1, count: 4, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 2 (System, PID: 4) 4
Sequence
»
Symbol Parameters
KeWaitForMutexObject ret_val_out = 0x102

Kernel Graph 24

Kernel Graph

Kernel Graph Legend
Code Block #32 (EP #62)
»
Information Value
Trigger Iru.sys+0x2c63b0
Start Address 0xfffff8004169fe30
Execution Path #62 (length: 1, count: 4, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 2 (System, PID: 4) 4
Sequence
»
Symbol Parameters
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1

Kernel Graph 25

Kernel Graph

Kernel Graph Legend
Code Block #33 (EP #63)
»
Information Value
Trigger KeAcquireSpinLockRaiseToDpc+0x2c
Start Address 0xfffff800fc2b1d35
Execution Path #63 (length: 6, count: 3, processes: 1)
»
Information Value
Sequence Length 6
Processes
»
Process Count
Process 2 (System, PID: 4) 3
Sequence
»
Symbol Parameters
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a769d84
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a769d84
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b4669f0, Irp_unk_out = 0xffffe0003b4669f0, ret_val_out = 0x103

Kernel Graph 26

Kernel Graph

Kernel Graph Legend
Code Block #34 (EP #66, #73, #78, #82, #160)
»
Information Value
Trigger IopfCompleteRequest+0x213
Start Address 0xfffff800fc2c2260
Execution Path #66 (length: 12, count: 3, processes: 2)
»
Information Value
Sequence Length 12
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Process 25 (winlogon.exe, PID: 508) 2
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x81, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003af95ec0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdRestartConnect ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af83eb0, Tag = 0x0
Execution Path #73 (length: 11, count: 11, processes: 3)
»
Information Value
Sequence Length 11
Processes
»
Process Count
Process 2 (System, PID: 4) 8
Process 25 (winlogon.exe, PID: 508) 2
Process 24 (csrss.exe, PID: 456) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdRestartConnect ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af83eb0, Tag = 0x0
Execution Path #78 (length: 11, count: 3, processes: 2)
»
Information Value
Sequence Length 11
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Process 27 (dwm.exe, PID: 784) 2
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7881bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdRestartSuperConnect ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003a787240, Tag = 0x0
Execution Path #82 (length: 15, count: 1, processes: 1)
»
Information Value
Sequence Length 15
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7a43dc, SpinLock_unk_out = 0xffffe0003a7a43dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7a43dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7a43dc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdRestartConnect ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003a788210, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #160 (length: 22, count: 1, processes: 1)
»
Information Value
Sequence Length 22
Processes
»
Process Count
Process 36 (wmiadap.exe, PID: 3776) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdRestartSuperConnect ret_val_out = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003af83eb0, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x1
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0

Kernel Graph 27

Kernel Graph

Kernel Graph Legend
Code Block #35 (EP #72)
»
Information Value
Trigger Iru.sys+0x145b0
Start Address 0xfffff800f8865740
Execution Path #72 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
AfdDisconnectEventHandler ret_val_out = 0x0

Kernel Graph 28

Kernel Graph

Kernel Graph Legend
Code Block #36 (EP #183, #193, #195)
»
Information Value
Trigger Iru.sys+0x12f2f
Start Address 0xfffff800f883b542
Execution Path #183 (length: 335, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 335
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a763d44
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573e20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b7a1ad0, Irp_unk_out = 0xffffe0003b7a1ad0, ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b4669f0, Irp_unk_out = 0xffffe0003b4669f0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b4669f0, Irp_unk_out = 0xffffe0003b4669f0, ret_val_out = 0x103
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d574250
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a78773c
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769d84
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573e20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a763d44, SpinLock_unk_out = 0xffffe0003a763d44, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a763d44, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a763d44
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a766464, SpinLock_unk_out = 0xffffe0003a766464, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a766464, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a766464
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a76ffe4, SpinLock_unk_out = 0xffffe0003a76ffe4, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a76ffe4, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a76ffe4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004b328d00, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d573eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeWaitForMutexObject ret_val_out = 0x102
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a769d84
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x0
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a769d84
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769d84, SpinLock_unk_out = 0xffffe0003a769d84, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769d84, NewIrql_unk = 0x0, SpinLock_unk_out = 0xffffe0003a769d84
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e76b0, Irp_unk = 0xffffe0003b79bad0, Irp_unk_out = 0xffffe0003b79bad0, ret_val_out = 0x103
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6fe4, SpinLock_unk_out = 0xffffe0003a7b6fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6346dc, SpinLock_unk_out = 0xffffe0003c6346dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6346dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c6346dc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b6b64, SpinLock_unk_out = 0xffffe0003a7b6b64, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b6b64, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b6b64
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c6344fc, SpinLock_unk_out = 0xffffe0003c6344fc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c6344fc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003c6344fc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1464, SpinLock_unk_out = 0xffffe0003a7b1464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b66dc, SpinLock_unk_out = 0xffffe0003a7b66dc, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b66dc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b66dc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77cfe4, SpinLock_unk_out = 0xffffe0003a77cfe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77cfe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77cfe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e42c, SpinLock_unk_out = 0xffffe0003a77e42c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e42c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e42c
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
AfdDisconnectEventHandler ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9ddf670, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9ddf670, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d573f78, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8e, ret_val_ptr_out = 0xffffe0003a77c910
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9ddf670, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9ddf670, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d573c58, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8c, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000b9ddf670, Length = 0x8c, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd0002d573c58, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ProductOptions, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ProductOptions
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003a77c910, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9ddf670, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9ddf670, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d574048, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8e, ret_val_ptr_out = 0xffffe0003a77c910
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b9ddf670, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000b9ddf670, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002d573d28, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x8c, ret_val_ptr_out = 0xffffe0003a77c870
ObQueryNameString Object_ptr = 0xffffc000b9ddf670, Length = 0x8c, ObjectNameInfo_unk_out = 0xffffe0003a77c870, ReturnLength_ptr_out = 0xffffd0002d573d28, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ProductOptions, DestinationString_out = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ProductOptions
ExFreePoolWithTag P_ptr = 0xffffe0003a77c870, Tag = 0x0
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x1c, ret_val_ptr_out = 0xffffe0003c634190
_wcsicmp _String1 = ProductPolicy, _String2 = ImagePath, ret_val_out = 7
ExFreePoolWithTag P_ptr = 0xffffe0003a77c910, Tag = 0x0
ExFreePoolWithTag P_ptr = 0xffffe0003c634190, Tag = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #193 (length: 228, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 228
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7858ac, SpinLock_unk_out = 0xffffe0003a7858ac, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7858ac, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7858ac
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7858ac, SpinLock_unk_out = 0xffffe0003a7858ac, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7858ac, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7858ac
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a769904, SpinLock_unk_out = 0xffffe0003a769904, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a769904, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a769904
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d296eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c757b80, Irp_unk_out = 0xffffe0003c757b80, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd0002d296e20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c757b80, Irp_unk_out = 0xffffe0003c757b80, ret_val_out = 0x0
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
IoGetCurrentProcess ret_val_unk_out = 0xffffe0003a459040
PsGetProcessImageFileName ret_val_out = 0xffffe0003a459490
_stricmp _Str1 = System, _Str2 = winlogon.exe, ret_val_out = -4
Execution Path #195 (length: 64, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 64
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a78773c, SpinLock_unk_out = 0xffffe0003a78773c, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a78773c, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a78773c
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7b1fe4, SpinLock_unk_out = 0xffffe0003a7b1fe4, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7b1fe4, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7b1fe4
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x0
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd00029b18eb0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55af20
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c8359e0, Irp_unk_out = 0xffffe0003c8359e0, ret_val_out = 0x103
KeInitializeEvent Type_unk = 0x0, State = 0, Event_unk_out = 0xffffd00029b18e20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
IofCallDriver DeviceObject_unk = 0xffffe0004c9e7d00, Irp_unk = 0xffffe0003c8359e0, Irp_unk_out = 0xffffe0003c8359e0, ret_val_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77c464, SpinLock_unk_out = 0xffffe0003a77c464, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77c464, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77c464
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0, SpinLock_unk_out = 0xfffff800fc55c0b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a77e1bc, SpinLock_unk_out = 0xffffe0003a77e1bc, ret_val_unk_out = 0x2
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x20e8, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77f000
IoAllocateMdl VirtualAddress_ptr = 0xffffe0003a77f0e4, Length = 0x2000, SecondaryBuffer = 0, ChargeQuota = 0, Irp_unk = 0x0, Irp_unk_out = 0x0, ret_val_unk_out = 0xffffe0003b9d74c0
MmBuildMdlForNonPagedPool MemoryDescriptorList_unk = 0xffffe0003b9d74c0, MemoryDescriptorList_unk_out = 0xffffe0003b9d74c0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a77e1bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a77e1bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x0

Kernel Graph 29

Kernel Graph

Kernel Graph Legend
Code Block #37 (EP #87)
»
Information Value
Trigger IopfCompleteRequest+0x213
Start Address 0xfffff800fc2c6430
Execution Path #87 (length: 1, count: 4, processes: 2)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 2 (System, PID: 4) 3
Process 24 (csrss.exe, PID: 456) 1
Sequence
»
Symbol Parameters
KeSetEvent Event_unk = 0xffffd000292aa350, Increment_unk = 0x0, Wait = 0, Event_unk_out = 0xffffd000292aa350, ret_val_out = 0

Kernel Graph 30

Kernel Graph

Kernel Graph Legend
Code Block #38 (EP #93, #103)
»
Information Value
Trigger IopfCompleteRequest+0x213
Start Address 0xfffff800fc2c5f40
Execution Path #93 (length: 13, count: 1, processes: 1)
»
Information Value
Sequence Length 13
Processes
»
Process Count
Process 24 (csrss.exe, PID: 456) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x2
IoFreeMdl Mdl_unk = 0xffffe000487ed580
ExFreePoolWithTag P_ptr = 0xffffe0003a77e010, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x3f, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a7b6490
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7881bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoFreeIrp Irp_unk = 0xffffe0003c839cf0
Execution Path #103 (length: 12, count: 10, processes: 4)
»
Information Value
Sequence Length 12
Processes
»
Process Count
Process 24 (csrss.exe, PID: 456) 1
Process 2 (System, PID: 4) 7
Process 30 (explorer.exe, PID: 1184) 1
Process 21 (smss.exe, PID: 300) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003a7881bc, SpinLock_unk_out = 0xffffe0003a7881bc, ret_val_unk_out = 0x2
IoFreeMdl Mdl_unk = 0xffffe000487ed580
ExFreePoolWithTag P_ptr = 0xffffe0003a763750, Tag = 0x0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xffffe0003a7881bc, NewIrql_unk = 0x2, SpinLock_unk_out = 0xffffe0003a7881bc
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoFreeIrp Irp_unk = 0xffffe0003c841cf0

Kernel Graph 31

Kernel Graph

Kernel Graph Legend
Code Block #39 (EP #94, #96, #104, #107, #136)
»
Information Value
Trigger KiExecuteAllDpcs+0x26c
Start Address 0xfffff800fc2c46a0
Execution Path #94 (length: 6, count: 1, processes: 1)
»
Information Value
Sequence Length 6
Processes
»
Process Count
Process 24 (csrss.exe, PID: 456) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x3f, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a779840
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
Execution Path #96 (length: 9, count: 50, processes: 1)
»
Information Value
Sequence Length 9
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 50
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #104 (length: 5, count: 10, processes: 4)
»
Information Value
Sequence Length 5
Processes
»
Process Count
Process 24 (csrss.exe, PID: 456) 1
Process 2 (System, PID: 4) 7
Process 30 (explorer.exe, PID: 1184) 1
Process 21 (smss.exe, PID: 300) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
Execution Path #107 (length: 16, count: 21, processes: 1)
»
Information Value
Sequence Length 16
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 21
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x37d3
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
Execution Path #136 (length: 10, count: 5, processes: 1)
»
Information Value
Sequence Length 10
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 5
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x3f, Tag = 0x32544c46, ret_val_ptr_out = 0xffffe0003a77e230
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeInsertQueueDpc Dpc_unk = 0xfffff800fc55c290, SystemArgument1_ptr = 0x0, SystemArgument2_ptr = 0x0, Dpc_unk_out = 0xfffff800fc55c290, ret_val_out = 1
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0

Kernel Graph 32

Kernel Graph

Kernel Graph Legend
Code Block #40 (EP #101)
»
Information Value
Trigger KiExecuteAllDpcs+0x26c
Start Address 0xfffff800fc2b6db0
Execution Path #101 (length: 4, count: 1, processes: 1)
»
Information Value
Sequence Length 4
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1c8, SpinLock_unk_out = 0xfffff800fc55c1c8, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1c8, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1c8
IoCompleteRequest ret_val_out = 0xc0000016
IoCompleteRequest ret_val_out = 0xc0000016

Kernel Graph 33

Kernel Graph

Kernel Graph Legend
Code Block #41 (EP #111)
»
Information Value
Trigger Iru.sys+0x2be358
Start Address 0xfffff8004185501c
Execution Path #111 (length: 1, count: 4, processes: 2)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 2
Process 16 (officeclicktorun.exe, PID: 1740) 2
Sequence
»
Symbol Parameters
MmIsAddressValid VirtualAddress_ptr = 0xffffc000b902c530, ret_val_out = 1

Kernel Graph 34

Kernel Graph

Kernel Graph Legend
Code Block #42 (EP #112)
»
Information Value
Trigger Iru.sys+0x2b4858
Start Address 0xfffff80041b0ccd8
Execution Path #112 (length: 1, count: 6, processes: 2)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 3
Process 16 (officeclicktorun.exe, PID: 1740) 3
Sequence
»
Symbol Parameters
ObQueryNameString Object_ptr = 0xffffc000b902c530, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd0002ed2afb8, ret_val_out = 0xc0000004

Kernel Graph 35

Kernel Graph

Kernel Graph Legend
Code Block #43 (EP #113)
»
Information Value
Trigger Iru.sys+0x2c65a3
Start Address 0xfffff80041769710
Execution Path #113 (length: 1, count: 7, processes: 3)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 2
Process 25 (winlogon.exe, PID: 508) 2
Process 16 (officeclicktorun.exe, PID: 1740) 3
Sequence
»
Symbol Parameters
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x94, ret_val_ptr_out = 0xffffe0003af83ef0

Kernel Graph 36

Kernel Graph

Kernel Graph Legend
Code Block #44 (EP #114)
»
Information Value
Trigger Iru.sys+0x2c672c
Start Address 0xfffff800416d9770
Execution Path #114 (length: 1, count: 2, processes: 2)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 1
Process 16 (officeclicktorun.exe, PID: 1740) 1
Sequence
»
Symbol Parameters
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS

Kernel Graph 37

Kernel Graph

Kernel Graph Legend
Code Block #45 (EP #116)
»
Information Value
Trigger Iru.sys+0x2c5797
Start Address 0xfffff800417b65c0
Execution Path #116 (length: 1, count: 2, processes: 2)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 10 (svchost.exe, PID: 1000) 1
Process 16 (officeclicktorun.exe, PID: 1740) 1
Sequence
»
Symbol Parameters
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8

Kernel Graph 38

Kernel Graph

Kernel Graph Legend
Code Block #46 (EP #117)
»
Information Value
Trigger Iru.sys+0x2bd046
Start Address 0xfffff800417c2ca0
Execution Path #117 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
ZwOpenProcess DesiredAccess_unk = 0x1fffff, ObjectAttributes_ptr = 0xffffd00043ff5040, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName_ptr = 0x0, ObjectAttributes_deref_Attributes = 0x0, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ClientId_ptr = 0xffffd00043ff5020, ClientId_deref_UniqueProcess_unk = 0x1fc, ClientId_deref_UniqueThread_unk = 0x0, ProcessHandle_ptr_out = 0xffffd00043ff5000, ProcessHandle_out = 0x46c, ret_val_out = 0x0

Kernel Graph 39

Kernel Graph

Kernel Graph Legend
Code Block #47 (EP #118)
»
Information Value
Trigger Iru.sys+0x2cf16d
Start Address 0xfffff800417c2b00
Execution Path #118 (length: 1, count: 2, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 2
Sequence
»
Symbol Parameters
ZwQueryInformationProcess ProcessHandle_unk = 0x46c, ProcessInformationClass_unk = 0x1b, ProcessInformationLength = 0x0, ProcessInformation_ptr_out = 0x0, ReturnLength_ptr_out = 0xffffd00043ff5098, ret_val_out = 0xc0000004

Kernel Graph 40

Kernel Graph

Kernel Graph Legend
Code Block #48 (EP #119)
»
Information Value
Trigger Iru.sys+0x2b2ec6
Start Address 0xfffff800417c2e40
Execution Path #119 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
ZwOpenFile DesiredAccess_unk = 0x80000000, ObjectAttributes_ptr = 0xffffd00043ff5040, ObjectAttributes_deref_Length = 0x30, ObjectAttributes_deref_RootDirectory_unk = 0x0, ObjectAttributes_deref_ObjectName = \Device\HarddiskVolume1\Windows\System32\winlogon.exe, ObjectAttributes_deref_Attributes = 0x200, ObjectAttributes_deref_SecurityDescriptor_ptr = 0x0, ObjectAttributes_deref_SecurityQualityOfService_ptr = 0x0, ShareAccess = 0x3, OpenOptions = 0x0, FileHandle_ptr_out = 0xffffd00043ff5008, FileHandle_out = 0xffffffff80001064, IoStatusBlock_unk_out = 0xffffd00043ff5030, ret_val_out = 0x0

Kernel Graph 41

Kernel Graph

Kernel Graph Legend
Code Block #49 (EP #120)
»
Information Value
Trigger Iru.sys+0x2cc547
Start Address 0xfffff80041a74b50
Execution Path #120 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
ObReferenceObjectByHandle Handle_unk = 0xffffffff80001064, DesiredAccess_unk = 0x10000000, ObjectType_unk = 0xffffe0003a468dc0, AccessMode_unk = 0x0, Object_ptr_out = 0xffffd00043ff50a8, Object_out = 0xffffe0003c6f9d00, HandleInformation_unk_out = 0x0, ret_val_out = 0x0

Kernel Graph 42

Kernel Graph

Kernel Graph Legend
Code Block #50 (EP #121)
»
Information Value
Trigger Iru.sys+0x2c97b2
Start Address 0xfffff80041ab0c78
Execution Path #121 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
IoVolumeDeviceToDosName VolumeDeviceObject_ptr = 0xffffe0003b695780, DosName_out = C:, ret_val_out = 0x0

Kernel Graph 43

Kernel Graph

Kernel Graph Legend
Code Block #51 (EP #122)
»
Information Value
Trigger Iru.sys+0x2c32f1
Start Address 0xfffff80041772b40
Execution Path #122 (length: 1, count: 2, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 2
Sequence
»
Symbol Parameters
RtlAppendUnicodeStringToString Destination = \??\, Source = C:, Destination_out = \??\C:, ret_val_out = 0x0

Kernel Graph 44

Kernel Graph

Kernel Graph Legend
Code Block #52 (EP #123)
»
Information Value
Trigger Iru.sys+0x2b3dbf
Start Address 0xfffff800416d4700
Execution Path #123 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
ObfDereferenceObject Object_ptr = 0xffffe0003c6f9d00, ret_val_ptr_out = 0x8000

Kernel Graph 45

Kernel Graph

Kernel Graph Legend
Code Block #53 (EP #124)
»
Information Value
Trigger Iru.sys+0x2b9417
Start Address 0xfffff800417c29c0
Execution Path #124 (length: 1, count: 2, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 2
Sequence
»
Symbol Parameters
ZwClose Handle_unk = 0xffffffff80001064, ret_val_out = 0x0

Kernel Graph 46

Kernel Graph

Kernel Graph Legend
Code Block #54 (EP #125)
»
Information Value
Trigger Iru.sys+0x2b55d6
Start Address 0xfffff80041aa5010
Execution Path #125 (length: 1, count: 1, processes: 1)
»
Information Value
Sequence Length 1
Processes
»
Process Count
Process 25 (winlogon.exe, PID: 508) 1
Sequence
»
Symbol Parameters
RtlFreeAnsiString AnsiString = \

Kernel Graph 47

Kernel Graph

Kernel Graph Legend
Code Block #55 (EP #191)
»
Information Value
Trigger ExpWorkerThread+0xe7
Start Address 0xffffe0003c9c29f5
Execution Path #191 (length: 686, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 686
Processes
»
Process Count
Process 2 (System, PID: 4) 1
Sequence
»
Symbol Parameters
ExpEnumerateCallback ret_val_out = 0x0
ExpEnumerateCallback ret_val_out = 0x0
ExpEnumerateCallback ret_val_out = 0x0
ExpEnumerateCallback ret_val_out = 0xfffff800f7ae64c0
ExpEnumerateCallback ret_val_out = 0xfffff80041b86ea4
RtlPcToFileHeader PcValue_ptr = 0xfffff80041b86ea4, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff80041684000, ret_val_ptr_out = 0xfffff80041684000
ExpEnumerateCallback ret_val_out = 0xfffff80041627a20
RtlPcToFileHeader PcValue_ptr = 0xfffff80041627a20, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff80041611000, ret_val_ptr_out = 0xfffff80041611000
ExpEnumerateCallback ret_val_out = 0xfffff800f7ec36f0
RtlPcToFileHeader PcValue_ptr = 0xfffff800f7ec36f0, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f7ea0000, ret_val_ptr_out = 0xfffff800f7ea0000
ExpEnumerateCallback ret_val_out = 0xfffff800f81bdc30
RtlPcToFileHeader PcValue_ptr = 0xfffff800f81bdc30, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f8180000, ret_val_ptr_out = 0xfffff800f8180000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f921c760
RtlPcToFileHeader PcValue_ptr = 0xfffff800f921c760, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f9170000, ret_val_ptr_out = 0xfffff800f9170000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0xfffff800f806fd20
RtlPcToFileHeader PcValue_ptr = 0xfffff800f806fd20, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f8040000, ret_val_ptr_out = 0xfffff800f8040000
ExpEnumerateCallback ret_val_out = 0x0
ExpEnumerateCallback ret_val_out = 0xfffff800f7eea420
RtlPcToFileHeader PcValue_ptr = 0xfffff800f7eea420, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f7ea0000, ret_val_ptr_out = 0xfffff800f7ea0000
ExpEnumerateCallback ret_val_out = 0xfffff800f86f6a30
RtlPcToFileHeader PcValue_ptr = 0xfffff800f86f6a30, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f8630000, ret_val_ptr_out = 0xfffff800f8630000
ExpEnumerateCallback ret_val_out = 0xfffff800f92836b0
RtlPcToFileHeader PcValue_ptr = 0xfffff800f92836b0, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f9170000, ret_val_ptr_out = 0xfffff800f9170000
ExpEnumerateCallback ret_val_out = 0xfffff80041cb5748
RtlPcToFileHeader PcValue_ptr = 0xfffff80041cb5748, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff80041684000, ret_val_ptr_out = 0xfffff80041684000
ExpEnumerateCallback ret_val_out = 0xfffff800f9ee4230
RtlPcToFileHeader PcValue_ptr = 0xfffff800f9ee4230, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800f9e50000, ret_val_ptr_out = 0xfffff800f9e50000
ExpEnumerateCallback ret_val_out = 0xfffff800faac8930
RtlPcToFileHeader PcValue_ptr = 0xfffff800faac8930, BaseOfImage_ptr_out = 0xffffd0002d206f38, BaseOfImage_out = 0xfffff800faac0000, ret_val_ptr_out = 0xfffff800faac0000
ExpEnumerateCallback ret_val_out = 0x0
ExpEnumerateCallback ret_val_out = 0x0
ExpEnumerateCallback ret_val_out = 0x0
ObReferenceObjectByName ObjectName = \ObjectTypes\Type, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a451df0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a451df0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Directory, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a4556a0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a4556a0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\SymbolicLink, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a43e080, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a43e080, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Token, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a45fa10, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a45fa10, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Job, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a45ff20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a45ff20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Process, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a460080, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a460080, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Thread, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a458e90, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a458e90, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\UserApcReserve, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a43f470, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a43f470, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\IoCompletionReserve, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a45f320, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a45f320, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\DebugObject, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a459ab0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a459ab0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Event, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a46ceb0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a46ceb0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Mutant, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a44ee40, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a44ee40, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Callback, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a45dca0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a45dca0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Semaphore, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a46aeb0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a46aeb0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Timer, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a44d300, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a44d300, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\IRTimer, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a485f20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a485f20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Profile, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a46beb0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a46beb0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\KeyedEvent, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a46bd50, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a46bd50, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\WindowStation, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a45bf20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a45bf20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Desktop, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a45bdc0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a45bdc0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Composition, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a48ef20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a48ef20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\RawInputManager, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a48edc0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a48edc0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\TpWorkerFactory, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a450f20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a450f20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Adapter, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a450dc0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a450dc0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Controller, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a470f20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a470f20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Device, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a470dc0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a470dc0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Driver, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a452f20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a452f20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\IoCompletion, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a452dc0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a452dc0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\WaitCompletionPacket, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a468f20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a468f20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\File, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a468dc0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a468dc0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\TmTm, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a45ef20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a45ef20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\TmTx, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a45edc0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a45edc0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\TmRm, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a48cf20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a48cf20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\TmEn, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a48cdc0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a48cdc0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Section, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a454f20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a454f20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Session, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a454dc0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a454dc0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Partition, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a48df20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a48df20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\Key, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a49ef20, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a49ef20, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\ALPC Port, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a49cd70, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a49cd70, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\PowerRequest, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a490cd0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a490cd0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\WmiGuid, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a4c2cd0, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a4c2cd0, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\EtwRegistration, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a4a5d00, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a4a5d00, ret_val_ptr_out = 0x2
ObReferenceObjectByName ObjectName = \ObjectTypes\EtwConsumer, Attributes = 0x0, PassedAccessState_unk = 0x0, DesiredAccess_unk = 0x0, ObjectType_unk = 0xffffe0003a451df0, AccessMode_unk = 0xffffd0002d206a00, ParseContext_ptr = 0x0, ParseContext_ptr_out = 0x0, Object_ptr_out = 0xffffd0002d206ca0, Object_out = 0xffffe0003a4a3d00, ret_val_out = 0x0
ObfDereferenceObject Object_ptr = 0xffffe0003a4a3d00, ret_val_ptr_out = 0x2
KeProcessorGroupAffinity ret_val_out = 0x1
KeSetSystemGroupAffinityThread Affinity_unk = 0xffffd0002d206fa8, PreviousAffinity_unk_out = 0x0
KeRevertToUserAffinityThread -
KeProcessorGroupAffinity ret_val_out = 0x1
KeSetSystemGroupAffinityThread Affinity_unk = 0xffffd0002d207020, PreviousAffinity_unk_out = 0x0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cdd00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c86a4
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cde00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c86b0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cdfc0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c86bc
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417ce340, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c86d4
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417ce440, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c86e0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417ce540, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c86ec
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417ce7c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c86f8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cea00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8704
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417ceac0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8710
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417ceb80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c871c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cec40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8728
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417ced00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8734
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cee40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8740
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cef80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c874c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cf080, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8758
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a3ff8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e08, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cf440, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8764
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cf5c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8770
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cf6c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c877c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cfd40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c87a0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4020
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e30, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4028
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e38, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4030
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4038
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e48, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4040
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e50, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4048
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e58, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4050
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e60, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4058
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e68, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4060
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e70, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4068
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e78, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4070
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417c90b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8200
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cd430, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c85a8
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4088
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7e98, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4090
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7ea0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4098
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7ea8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a40a0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7eb0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a40a8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7eb8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a40b0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7ec0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a40b8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7ec8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a40c0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7ed0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417cff00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c87ac
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a40d0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7ee0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a40d8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7ee8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417d0000, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c87b8
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417d0100, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c87c4
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a40f0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f00, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417c9380, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8218
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417c95b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8230
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417c9910, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c823c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417c9c60, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8248
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417c9fb0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8254
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417ca300, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8260
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4128
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f38, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c75b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8128
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4130
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f40, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4138
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f48, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4140
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f50, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4148
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f58, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4150
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f60, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4158
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f68, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4160
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f70, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4168
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f78, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4170
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f80, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4178
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f88, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4180
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f90, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4188
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7f98, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4190
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fa0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4198
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fa8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41a0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fb0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41a8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fb8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41b0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fc0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41b8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fc8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41c0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fd0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41c8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fd8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41d0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fe0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41d8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7fe8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41e0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7ff0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41e8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7ff8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41f0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8000, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a41f8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8008, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4200
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8010, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c73c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c811c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4208
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8018, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4210
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8020, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4218
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8028, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4220
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8030, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4228
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8038, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4230
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8040, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4238
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8048, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4240
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8050, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4248
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8058, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4250
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8060, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4258
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8068, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4260
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8070, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4268
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8078, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4270
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8080, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4278
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8088, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4280
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8090, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c73c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c811c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4288
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8098, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4290
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4298
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80a8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42a0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42a8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80b8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42b0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42b8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80c8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42c0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42c8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80d8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42d0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42d8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80e8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42e0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42e8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c80f8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42f0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8100, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a42f8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8108, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4300
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8110, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c73c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c811c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4308
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8118, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4310
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8120, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4318
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8128, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4320
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8130, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4328
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8138, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4330
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8140, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4338
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8148, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4340
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8150, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4348
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8158, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4350
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8160, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4358
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8168, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4360
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8170, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4368
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8178, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4370
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8180, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4378
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8188, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4380
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8190, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c73c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c811c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4388
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8198, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c6ca0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c80e0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4390
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4398
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81a8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43a0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43a8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81b8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43b0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43b8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81c8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43c0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43c8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81d8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43d0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43d8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81e8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43e0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43e8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c81f8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43f0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8200, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a43f8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8208, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4400
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8210, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c73c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c811c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4408
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8218, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c73c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c811c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4410
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8220, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4418
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8228, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4420
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8230, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4428
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8238, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4430
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8240, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4438
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8248, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4440
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8250, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4448
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8258, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4450
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8260, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4458
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8268, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4460
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8270, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4468
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8278, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4470
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8280, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4478
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8288, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4480
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8290, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4488
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8298, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c73c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c811c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4490
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4498
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82a8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44a0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44a8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82b8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44b0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44b8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82c8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44c0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44c8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82d8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44d0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44d8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82e8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44e0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44e8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c82f8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44f0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8300, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a44f8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8308, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4500
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8310, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c73c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c811c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4508
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8318, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c73c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c811c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4510
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8320, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4518
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8328, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4520
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8330, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4528
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8338, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4530
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8340, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4538
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8348, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4540
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8350, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4548
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8358, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4550
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8360, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4558
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8368, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4560
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8370, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4568
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8378, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4570
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8380, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4578
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8388, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4580
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8390, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4588
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8398, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4590
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4598
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83a8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45a0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45a8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83b8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45b0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45b8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83c8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45c0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45c8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83d8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45d0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45d8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83e8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45e0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45e8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c83f8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45f0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8400, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c75b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8128
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a45f8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8408, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4600
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8410, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4608
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8418, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c77a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8134
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4610
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8420, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c77a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8134
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4618
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8428, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4620
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8430, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4628
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8438, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4630
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8440, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4638
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8448, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c75b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8128
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4640
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8450, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c75b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8128
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4648
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8458, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4650
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8460, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4658
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8468, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4660
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8470, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4668
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8478, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4670
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8480, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4678
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8488, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c7b70, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c814c
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4680
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8490, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
RtlLookupFunctionEntry ControlPc = 0xfffff800417ca650, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c826c
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4690
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84a0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c75b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8128
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4698
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84a8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c75b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0xfffff800419c8128
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46a0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84b0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46a8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84b8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46b0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84c0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46b8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84c8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46c0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84d0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46c8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84d8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46d0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84e0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46d8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84e8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46e0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84f0, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46e8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c84f8, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46f0
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8500, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a46f8
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8508, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4700
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8510, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4708
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8518, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4710
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8520, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4718
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8528, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4720
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8530, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4728
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8538, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4730
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8540, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4738
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8548, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4740
RtlLookupFunctionEntry ControlPc = 0xfffff800417c8550, HistoryTable_unk = 0x0, ImageBase_ptr_out = 0xffffd0002d206b68, HistoryTable_unk_out = 0x0, ret_val_unk_out = 0x0
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4748
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4750
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4758
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4760
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4768
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4770
RtlSectionTableFromVirtualAddress ret_val_out = 0xfffff80041684210
KiGetInterruptObjectAddress ret_val_out = 0xfffff800419a4778
KeProcessorGroupAffinity ret_val_out = 0x1
KeSetSystemGroupAffinityThread Affinity_unk = 0xffffd0002d206f48, PreviousAffinity_unk_out = 0x0
KeRevertToUserAffinityThread -
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x936, Tag = 0x6944624f, ret_val_ptr_out = 0xffffe0003a77e6c0
ExAllocatePoolWithTag PoolType_unk = 0x0, NumberOfBytes_ptr = 0x59587, Tag = 0x6944624f, ret_val_ptr_out = 0xffffe0003ca0b000
KeSetCoalescableTimer Timer_unk = 0xffffe0003af29384, DueTime_unk = 0xffffffffb7a9baa7, Period = 0x0, TolerableDelay = 0x662, Dpc_unk = 0xffffe0003af293c4, Timer_unk_out = 0xffffe0003af29384, ret_val_out = 0
KeWaitForMutexObject -

Kernel Graph 48

Kernel Graph

Kernel Graph Legend
Code Block #56 (EP #166)
»
Information Value
Trigger ??_C@_1DA@HOOFFHMM@?$AAK?$AAe?$AAr?$AAn?$AAe?$AAl?$AA?9?$AAM?$AAU?$AAI?$AA?9?$AAL?$AAa?$AAn?$AAg?$AAu?$AAa?$AAg?$AAe?$AA?9?$AAS?$AAK?$AAU?$AA?$AA@FNODOBFM@+0x1493
Start Address 0xffffe0003c959224
Execution Path #166 (length: 2, count: 3, processes: 3)
»
Information Value
Sequence Length 2
Processes
»
Process Count
Process 107 (msfeedssync.exe, PID: 4172) 1
Process 42 (iexplore.exe, PID: 556) 1
Process 11 (svchost.exe, PID: 324) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xffffe0003c959794, SpinLock_unk_out = 0xffffe0003c959794, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xffffe0003c959794, NewIrql_unk = 0x780d1c02, SpinLock_unk_out = 0xffffe0003c959794

Kernel Graph 49

Kernel Graph

Kernel Graph Legend
Code Block #57 (EP #194)
»
Information Value
Trigger MiIsAddressValid+0xa9
Start Address 0xfffff800fc2cb628
Execution Path #194 (length: 1592, count: 1, processes: 1 incomplete)
»
Information Value
Sequence Length 1592
Processes
»
Process Count
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\28F97816197AFF182518AA44FEC1A0CE5CB64C8A, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\28F97816197AFF182518AA44FEC1A0CE5CB64C8A
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\28F97816197AFF182518AA44FEC1A0CE5CB64C8A, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\28F97816197AFF182518AA44FEC1A0CE5CB64C8A
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\28F97816197AFF182518AA44FEC1A0CE5CB64C8A, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\28F97816197AFF182518AA44FEC1A0CE5CB64C8A
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\293621028B20ED02F566C532D1D6ED909F45002F, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\293621028B20ED02F566C532D1D6ED909F45002F
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\293621028B20ED02F566C532D1D6ED909F45002F, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\293621028B20ED02F566C532D1D6ED909F45002F
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\293621028B20ED02F566C532D1D6ED909F45002F, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\293621028B20ED02F566C532D1D6ED909F45002F
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2A1D6027D94AB10A1C4D915CCD33A0CB3E2D54CB, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2A1D6027D94AB10A1C4D915CCD33A0CB3E2D54CB
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2A1D6027D94AB10A1C4D915CCD33A0CB3E2D54CB, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2A1D6027D94AB10A1C4D915CCD33A0CB3E2D54CB
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2A1D6027D94AB10A1C4D915CCD33A0CB3E2D54CB, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2A1D6027D94AB10A1C4D915CCD33A0CB3E2D54CB
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2AC8D58B57CEBF2F49AFF2FC768F511462907A41, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2AC8D58B57CEBF2F49AFF2FC768F511462907A41
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2AC8D58B57CEBF2F49AFF2FC768F511462907A41, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2AC8D58B57CEBF2F49AFF2FC768F511462907A41
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2AC8D58B57CEBF2F49AFF2FC768F511462907A41, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2AC8D58B57CEBF2F49AFF2FC768F511462907A41
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2BB1F53E550C1DC5F1D4E6B76A464B550602AC21, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2BB1F53E550C1DC5F1D4E6B76A464B550602AC21
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2BB1F53E550C1DC5F1D4E6B76A464B550602AC21, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2BB1F53E550C1DC5F1D4E6B76A464B550602AC21
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2BB1F53E550C1DC5F1D4E6B76A464B550602AC21, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2BB1F53E550C1DC5F1D4E6B76A464B550602AC21
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2C8AFFCE966430BA04C04F81DD4B49C71B5B81A0, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2C8AFFCE966430BA04C04F81DD4B49C71B5B81A0
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2C8AFFCE966430BA04C04F81DD4B49C71B5B81A0, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2C8AFFCE966430BA04C04F81DD4B49C71B5B81A0
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2C8AFFCE966430BA04C04F81DD4B49C71B5B81A0, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2C8AFFCE966430BA04C04F81DD4B49C71B5B81A0
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2D0D5214FF9EAD9924017420476E6C852727F543, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2D0D5214FF9EAD9924017420476E6C852727F543
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2D0D5214FF9EAD9924017420476E6C852727F543, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2D0D5214FF9EAD9924017420476E6C852727F543
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2D0D5214FF9EAD9924017420476E6C852727F543, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2D0D5214FF9EAD9924017420476E6C852727F543
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2DE16A5677BACA39E1D68C30DCB14ABE22A6179B, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2DE16A5677BACA39E1D68C30DCB14ABE22A6179B
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2DE16A5677BACA39E1D68C30DCB14ABE22A6179B, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2DE16A5677BACA39E1D68C30DCB14ABE22A6179B
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2DE16A5677BACA39E1D68C30DCB14ABE22A6179B, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2DE16A5677BACA39E1D68C30DCB14ABE22A6179B
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E14DAEC28F0FA1E8E389A4EABEB26C00AD383C3, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E14DAEC28F0FA1E8E389A4EABEB26C00AD383C3
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E14DAEC28F0FA1E8E389A4EABEB26C00AD383C3, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E14DAEC28F0FA1E8E389A4EABEB26C00AD383C3
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E14DAEC28F0FA1E8E389A4EABEB26C00AD383C3, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E14DAEC28F0FA1E8E389A4EABEB26C00AD383C3
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E66C9841181C08FB1DFABD4FF8D5CC72BE08F02, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E66C9841181C08FB1DFABD4FF8D5CC72BE08F02
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E66C9841181C08FB1DFABD4FF8D5CC72BE08F02, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E66C9841181C08FB1DFABD4FF8D5CC72BE08F02
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E66C9841181C08FB1DFABD4FF8D5CC72BE08F02, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2E66C9841181C08FB1DFABD4FF8D5CC72BE08F02
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F783D255218A74A653971B52CA29C45156FE919, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F783D255218A74A653971B52CA29C45156FE919
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F783D255218A74A653971B52CA29C45156FE919, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F783D255218A74A653971B52CA29C45156FE919
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F783D255218A74A653971B52CA29C45156FE919, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F783D255218A74A653971B52CA29C45156FE919
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F8F364FE1589744215987A52A9AD06995267FB5, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F8F364FE1589744215987A52A9AD06995267FB5
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F8F364FE1589744215987A52A9AD06995267FB5, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F8F364FE1589744215987A52A9AD06995267FB5
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F8F364FE1589744215987A52A9AD06995267FB5, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2F8F364FE1589744215987A52A9AD06995267FB5
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3043FA4FF257DCA0C380EE2E58EA78B23FE6BBC1, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3043FA4FF257DCA0C380EE2E58EA78B23FE6BBC1
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3043FA4FF257DCA0C380EE2E58EA78B23FE6BBC1, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3043FA4FF257DCA0C380EE2E58EA78B23FE6BBC1
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3043FA4FF257DCA0C380EE2E58EA78B23FE6BBC1, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3043FA4FF257DCA0C380EE2E58EA78B23FE6BBC1
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30779E9315022E94856A3FF8BCF815B082F9AEFD, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30779E9315022E94856A3FF8BCF815B082F9AEFD
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30779E9315022E94856A3FF8BCF815B082F9AEFD, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30779E9315022E94856A3FF8BCF815B082F9AEFD
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30779E9315022E94856A3FF8BCF815B082F9AEFD, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30779E9315022E94856A3FF8BCF815B082F9AEFD
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30D4246F07FFDB91898A0BE9496611EB8C5E46E5, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30D4246F07FFDB91898A0BE9496611EB8C5E46E5
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30D4246F07FFDB91898A0BE9496611EB8C5E46E5, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30D4246F07FFDB91898A0BE9496611EB8C5E46E5
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30D4246F07FFDB91898A0BE9496611EB8C5E46E5, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\30D4246F07FFDB91898A0BE9496611EB8C5E46E5
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\313B8D0E7E2E4D20AE8668FFE59DB5193CBF7A32, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\313B8D0E7E2E4D20AE8668FFE59DB5193CBF7A32
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\313B8D0E7E2E4D20AE8668FFE59DB5193CBF7A32, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\313B8D0E7E2E4D20AE8668FFE59DB5193CBF7A32
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\313B8D0E7E2E4D20AE8668FFE59DB5193CBF7A32, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\313B8D0E7E2E4D20AE8668FFE59DB5193CBF7A32
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3143649BECCE27ECED3A3F0B8F0DE4E891DDEECA, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3143649BECCE27ECED3A3F0B8F0DE4E891DDEECA
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3143649BECCE27ECED3A3F0B8F0DE4E891DDEECA, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3143649BECCE27ECED3A3F0B8F0DE4E891DDEECA
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3143649BECCE27ECED3A3F0B8F0DE4E891DDEECA, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3143649BECCE27ECED3A3F0B8F0DE4E891DDEECA
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F1FD68226320EEC63B3F9DEA4A3E537C7C3917, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F1FD68226320EEC63B3F9DEA4A3E537C7C3917
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F1FD68226320EEC63B3F9DEA4A3E537C7C3917, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F1FD68226320EEC63B3F9DEA4A3E537C7C3917
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F1FD68226320EEC63B3F9DEA4A3E537C7C3917, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F1FD68226320EEC63B3F9DEA4A3E537C7C3917
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F9FC8BA3805986B721EA7295C65B3A44534274, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F9FC8BA3805986B721EA7295C65B3A44534274
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F9FC8BA3805986B721EA7295C65B3A44534274, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F9FC8BA3805986B721EA7295C65B3A44534274
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F9FC8BA3805986B721EA7295C65B3A44534274, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\31F9FC8BA3805986B721EA7295C65B3A44534274
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\323C118E1BF7B8B65254E2E2100DD6029037F096, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\323C118E1BF7B8B65254E2E2100DD6029037F096
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\323C118E1BF7B8B65254E2E2100DD6029037F096, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\323C118E1BF7B8B65254E2E2100DD6029037F096
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\323C118E1BF7B8B65254E2E2100DD6029037F096, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\323C118E1BF7B8B65254E2E2100DD6029037F096
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\32F442093B36D7031B75CA4DADDCB327FAA02B9C, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\32F442093B36D7031B75CA4DADDCB327FAA02B9C
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\32F442093B36D7031B75CA4DADDCB327FAA02B9C, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\32F442093B36D7031B75CA4DADDCB327FAA02B9C
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\32F442093B36D7031B75CA4DADDCB327FAA02B9C, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\32F442093B36D7031B75CA4DADDCB327FAA02B9C
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\335A7FF00927CF2DF278E2C9192F7A4D5534F80C, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\335A7FF00927CF2DF278E2C9192F7A4D5534F80C
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\335A7FF00927CF2DF278E2C9192F7A4D5534F80C, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\335A7FF00927CF2DF278E2C9192F7A4D5534F80C
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\335A7FF00927CF2DF278E2C9192F7A4D5534F80C, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\335A7FF00927CF2DF278E2C9192F7A4D5534F80C
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\339B6B1450249B557A01877284D9E02FC3D2D8E9, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\339B6B1450249B557A01877284D9E02FC3D2D8E9
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\339B6B1450249B557A01877284D9E02FC3D2D8E9, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\339B6B1450249B557A01877284D9E02FC3D2D8E9
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\339B6B1450249B557A01877284D9E02FC3D2D8E9, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\339B6B1450249B557A01877284D9E02FC3D2D8E9
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\342CD9D3062DA48C346965297F081EBC2EF68FDC, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\342CD9D3062DA48C346965297F081EBC2EF68FDC
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\342CD9D3062DA48C346965297F081EBC2EF68FDC, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\342CD9D3062DA48C346965297F081EBC2EF68FDC
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\342CD9D3062DA48C346965297F081EBC2EF68FDC, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\342CD9D3062DA48C346965297F081EBC2EF68FDC
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\34D499426F9FC2BB27B075BAB682AAE5EFFCBA74, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\34D499426F9FC2BB27B075BAB682AAE5EFFCBA74
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\34D499426F9FC2BB27B075BAB682AAE5EFFCBA74, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\34D499426F9FC2BB27B075BAB682AAE5EFFCBA74
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\34D499426F9FC2BB27B075BAB682AAE5EFFCBA74, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\34D499426F9FC2BB27B075BAB682AAE5EFFCBA74
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\36B12B49F9819ED74C9EBC380FC6568F5DACB2F7, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\36B12B49F9819ED74C9EBC380FC6568F5DACB2F7
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\36B12B49F9819ED74C9EBC380FC6568F5DACB2F7, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\36B12B49F9819ED74C9EBC380FC6568F5DACB2F7
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\36B12B49F9819ED74C9EBC380FC6568F5DACB2F7, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\36B12B49F9819ED74C9EBC380FC6568F5DACB2F7
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3753D295FC6D8BC39B375650BFFC821AED504E1A, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3753D295FC6D8BC39B375650BFFC821AED504E1A
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3753D295FC6D8BC39B375650BFFC821AED504E1A, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3753D295FC6D8BC39B375650BFFC821AED504E1A
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3753D295FC6D8BC39B375650BFFC821AED504E1A, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3753D295FC6D8BC39B375650BFFC821AED504E1A
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\379A197B418545350CA60369F33C2EAF474F2079, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\379A197B418545350CA60369F33C2EAF474F2079
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\379A197B418545350CA60369F33C2EAF474F2079, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\379A197B418545350CA60369F33C2EAF474F2079
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\379A197B418545350CA60369F33C2EAF474F2079, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\379A197B418545350CA60369F33C2EAF474F2079
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8fb8, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0x100, ret_val_ptr_out = 0xffffe0003af89f00
MmIsAddressValid VirtualAddress_ptr = 0xffffc000ba0b2d00, ret_val_out = 1
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0x0, ObjectNameInfo_unk_out = 0x0, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0xc0000004
ExAllocatePool PoolType_unk = 0x0, NumberOfBytes_ptr = 0xfe, ret_val_ptr_out = 0xffffe0003af8ff00
ObQueryNameString Object_ptr = 0xffffc000ba0b2d00, Length = 0xfe, ObjectNameInfo_unk_out = 0xffffe0003af8ff00, ReturnLength_ptr_out = 0xffffd000291a8c98, ret_val_out = 0x0
RtlCopyUnicodeString SourceString = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\37F76DE6077C90C5B13E931AB74110B4F2E49A27, DestinationString_out = \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\37F76DE6077C90C5B13E931AB74110B4F2E49A27
ExFreePoolWithTag P_ptr = 0xffffe0003af8ff00, Tag = 0x0
_wcsicmp _String1 = \Registry\User\, _String2 = \REGISTRY\MACHI, ret_val_out = 8
ExFreePoolWithTag P_ptr = 0xffffe0003af89f00, Tag = 0x0
For performance reasons, the remaining entries are omitted.
Click to download all entries as text file.

Kernel Graph 50

Kernel Graph

Kernel Graph Legend
Code Block #58 (EP #167)
»
Information Value
Trigger KeAcquireSpinLockRaiseToDpc+0x2c
Start Address 0xfffff800fc2b61e7
Execution Path #167 (length: 10, count: 1, processes: 1)
»
Information Value
Sequence Length 10
Processes
»
Process Count
Process 107 (msfeedssync.exe, PID: 4172) 1
Sequence
»
Symbol Parameters
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55af20, SpinLock_unk_out = 0xfffff800fc55af20, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55af20, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55af20
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
IoCompleteRequest ret_val_out = 0x1
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c0b0, SpinLock_unk_out = 0xfffff800fc55c0b0, ret_val_unk_out = 0x2
KeAcquireSpinLockRaiseToDpc SpinLock_unk = 0xfffff800fc55c1b0, SpinLock_unk_out = 0xfffff800fc55c1b0, ret_val_unk_out = 0x2
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c1b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c1b0
KeReleaseSpinLock SpinLock_unk = 0xfffff800fc55c0b0, NewIrql_unk = 0x2, SpinLock_unk_out = 0xfffff800fc55c0b0
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image