输入密码后winlogon!WLGeneric_Request_Logon_Credz_Execute调用了winlogon!WluiRequestCredentials等待logonui返回

       THREAD 81ec5930  Cid 0708.0de8  Teb: 7ffdd000 Win32Thread: ff2b2dd0 WAIT: (WrLpcReply) UserMode Non-Alertable
            81ec5b64  Semaphore Limit 0x1
        Waiting for reply to ALPC Message 87dff848 : queued at port 81ea96c0 : owned by process 9a752978
        Not impersonating
        DeviceMap                 8ba09a00
        Owning Process            81ea2030       Image:         winlogon.exe
        Attached Process          N/A            Image:         N/A
        Wait Start TickCount      275120226      Ticks: 662 (0:00:00:10.327)
        Context Switch Count      115            IdealProcessor: 0             
        UserTime                  00:00:00.015
        KernelTime                00:00:00.436
        Win32 Start Address ntdll!TppWorkerThread (0x76d612fe)
        Stack Init 8255afd0 Current 8255aaa0 Base 8255b000 Limit 82558000 Call 00000000
        Priority 14 BasePriority 13 PriorityDecrement 0 IoPriority 2 PagePriority 5
        ChildEBP RetAddr  
        8255aab8 82877fae nt!KiSwapContext+0x26 (FPO: [Uses EBP] [0,0,4])
        8255aaf0 82879583 nt!KiSwapThread+0x394
        8255ab18 8286aa1d nt!KiCommitThreadWait+0x461
        8255ab8c 8287db0c nt!KeWaitForSingleObject+0x505
        8255abbc 82dbcd1a nt!AlpcpSignalAndWait+0x142
        8255abfc 82df4fa3 nt!AlpcpReceiveSynchronousReply+0x8e
        8255aca0 82df7b81 nt!AlpcpProcessSynchronousRequest+0xaf9
        8255ad0c 829ad913 nt!NtAlpcSendWaitReceivePort+0x1a9
        8255ad0c 76cea084 nt!KiFastCallEntry+0x163 (FPO: [0,3] TrapFrame @ 8255ad34)
        00c4f164 76cc03c0 ntdll!KiFastSystemCallRet (FPO: [0,0,0])
        00c4f168 770caf06 ntdll!ZwAlpcSendWaitReceivePort+0xc (FPO: [8,0,0])
        00c4f1a0 770ddb19 RPCRT4!LRPC_CASSOCIATION::AlpcSendWaitReceivePort+0xcb
        00c4f1f0 770db93d RPCRT4!LRPC_BASE_CCALL::DoSendReceive+0xf2
        00c4f214 770e11c5 RPCRT4!LRPC_BASE_CCALL::SendReceive+0x8f
        00c4f224 7709619e RPCRT4!LRPC_CCALL::SendReceive+0x1e
        00c4f240 77109adf RPCRT4!I_RpcSendReceive+0xad
        00c4f25c 771107e0 RPCRT4!NdrSendReceive+0x50
        00c4f26c 77135bb2 RPCRT4!NdrpSendReceive+0xc (FPO: [0,1,0])
        00c4f684 005a5ca3 RPCRT4!NdrClientCall2+0x1ce
        00c4f69c 005a5995 winlogon!ClientWluirRequestCredentials+0x19 (FPO: [Non-Fpo])
        00c4f6f0 0057c5ef winlogon!WluiRequestCredentials+0x39 (FPO: [Non-Fpo])
        00c4f714 00582e3b winlogon!RequestCredentials+0x90 (FPO: [Non-Fpo])
        00c4f780 0059e996 winlogon!WLGeneric_Request_Logon_Credz_Execute+0xa6 (FPO: [Non-Fpo])
        00c4f798 76d5dda1 winlogon!StateMachineWorkerCallback+0x67 (FPO: [Non-Fpo])
        00c4f7bc 76d618e5 ntdll!TppWorkpExecuteCallback+0x121 (FPO: [Non-Fpo])
        00c4f920 76197647 ntdll!TppWorkerThread+0x5e7 (FPO: [Non-Fpo])
        00c4f92c 76cf0683 kernel32!BaseThreadInitThunk+0xe (FPO: [Non-Fpo])
        00c4f96c 76cf08df ntdll!__RtlUserThreadStart+0x23 (FPO: [Non-Fpo])
        00c4f984 00000000 ntdll!_RtlUserThreadStart+0x1b (FPO: [Non-Fpo])


kd> x winlogon!*main*
005b4b38          winlogon!WPP_MAIN_CB = <no type information>
00571410          winlogon!_imp____getmainargs = <no type information>
0057e153          winlogon!WinMain (_WinMain@16)
0058c476          winlogon!CUser::GetDomainName (public: unsigned short const * __thiscall CUser::GetDomainName(void)const )
0058c3fc          winlogon!CUser::SetDomainName (public: unsigned long __thiscall CUser::SetDomainName(unsigned short const *))
0059d781          winlogon!WinMainCRTStartup (_WinMainCRTStartup)
005b4190          winlogon!__native_dllmain_reason = <no type information>
00589982          winlogon!CMachine::IsDomainMember (public: int __thiscall CMachine::IsDomainMember(void))
005b4b6c          winlogon!MainThreadId = <no type information>
kd> dd 005b4b38
005b4b38  00000000 00000000 00010001 00000002
005b4b48  0004000f ffffffff 00000401 ffffffff
005b4b58  00000000 00000000 0000001c 00000000
005b4b68  00208560 00000000 00000000 00000000
005b4b78  00000000 00000000 00000000 00000000
005b4b88  00000000 00000000 00000000 00000000
005b4b98  00000000 00000000 00000000 00000000
005b4ba8  00000000 00000000 00000000 00207c38
kd> dd 00208560
00208560  00231048 00000053 005b3ec0 00000022
00208570  005b3e38 00000004 00208088 00000000
00208580  00000000 00000001 00000000 00000000
00208590  00000002 00000000 0000001c 0000000a
002085a0  00000000 00000000 0000000b 00000000
002085b0  00000000 00000000 00000000 00000000
002085c0  00000000 00000000 00000000 00000000
002085d0  00000000 00000000 00000000 00000000

kd> u 005b3ec0
winlogon!g_rpWLGeneric_States:
005b3ec0 e021            loopne  winlogon!g_rpWLGeneric_States+0x23 (005b3ee3)
005b3ec2 5b              pop     ebx
005b3ec3 000422          add     byte ptr [edx],al
005b3ec6 5b              pop     ebx
005b3ec7 00d4            add     ah,dl
005b3ec9 225b00          and     bl,byte ptr [ebx]
005b3ecc 48              dec     eax
005b3ecd 235b00          and     ebx,dword ptr [ebx]

kd> dd 005b3ec0+b*4
005b3eec  005b2534 005b25e0 005b262c 005b2668
005b3efc  005b26c8 005b2704 005b2788 005b27ac
005b3f0c  005b2848 005b286c 005b290c 005b29e8
005b3f1c  005b2a3c 005b2acc 005b2b18 005b2b54
005b3f2c  005b2bcc 005b2cc4 005b2cf4 005b2d24
005b3f3c  005b2d54 005b2dac 005b2de8 005b2e24
005b3f4c  005b2e60 005b2e9c 005b2edc 005b2f24
005b3f5c  005b2f74 005b2fa4 005b3068 005b308c
kd> u 005b2534
winlogon!g_xWLGeneric_Request_Logon_Credz_State:

005b2534 90              nop
005b2535 2557000000      and     eax,57h
005b253a 0000            add     byte ptr [eax],al
005b253c 95              xchg    eax,ebp
005b253d 2d5800d12f      sub     eax,2FD10058h
005b2542 58              pop     eax
005b2543 0008            add     byte ptr [eax],cl
005b2545 0000            add     byte ptr [eax],al
kd> dd 005b2534
005b2534  00572590 00000000 00582d95 00582fd1
005b2544  00000008 005b2558 00000004 005b25b8
005b2554  0000000b 00000002 00000050 00000000
005b2564  00000012 00000050 00000000 00000004
005b2574  00000002 00000002 00000019 0000000d
005b2584  00000000 0000001a 0000000c 00000000
005b2594  0000001b 0000000c 00000000 00000007
005b25a4  00000002 00000002 00000009 00000008
kd> u 00582d95
winlogon!WLGeneric_Request_Logon_Credz_Execute:

00582d95 cc              int     3
00582d96 2c68            sub     al,68h
00582d98 00d8            add     al,bl
00582d9a 5a              pop     edx
00582d9b 00e8            add     al,ch
00582d9d fb              sti
00582d9e a9010068f0      test    eax,0F0680001h
00582da3 17              pop     ss

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值