admin 管理员组

文章数量: 1184232

kd> .process
Implicit process is now 81ea2030
kd> kc
#
00 RPCRT4!NdrClientCall2
01 winlogon!ClientWluirDisplayStatus
02 winlogon!WluiDisplayStatus
03 winlogon!WlDisplayStatus
04 winlogon!WlDisplayStatusByResourceId
05 winlogon!WLGeneric_Authenticating_Execute
06 winlogon!StateMachineWorkerCallback
07 ntdll!TppWorkpExecuteCallback
08 ntdll!TppWorkerThread
09 kernel32!BaseThreadInitThunk
0a ntdll!__RtlUserThreadStart
0b ntdll!_RtlUserThreadStart

kd> kc
#
00 SspiCli!LsaLogonUser
01 winlogon!AuthenticateUser
02 winlogon!WLGeneric_Authenticating_Execute

03 winlogon!StateMachineWorkerCallback
04 ntdll!TppWorkpExecuteCallback
05 ntdll!TppWorkerThread
06 kernel32!BaseThreadInitThunk
07 ntdll!__RtlUserThreadStart
08 ntdll!_RtlUserThreadStart


kd> kc
#
00 SspiCli!SspirLogonUser
01 SspiCli!SspipLogonUser
02 winlogon!AuthenticateUser
03 winlogon!WLGeneric_Authenticating_Execute
04 winlogon!StateMachineWorkerCallback
05 ntdll!TppWorkpExecuteCallback
06 ntdll!TppWorkerThread
07 kernel32!BaseThreadInitThunk
08 ntdll!__RtlUserThreadStart
09 ntdll!_RtlUserThreadStart


kd> kc
#
00 RPCRT4!Invoke
01 RPCRT4!NdrStubCall2
02 RPCRT4!NdrServerCall2
03 RPCRT4!DispatchToStubInCNoAvrf
04 RPCRT4!RPC_INTERFACE::DispatchToStubWorker
05 RPCRT4!RPC_INTERFACE::DispatchToStub
06 RPCRT4!LRPC_SCALL::DispatchRequest
07 RPCRT4!LRPC_SCALL::QueueOrDispatchCall
08 RPCRT4!LRPC_SCALL::HandleRequest
09 RPCRT4!LRPC_SASSOCIATION::HandleRequest
0a RPCRT4!LRPC_ADDRESS::HandleRequest
0b RPCRT4!LRPC_ADDRESS::ProcessIO
0c RPCRT4!LrpcServerIoHandler
0d RPCRT4!LrpcIoComplete
0e ntdll!TppAlpcpExecuteCallback
0f ntdll!TppWorkerThread
10 kernel32!BaseThreadInitThunk
11 ntdll!__RtlUserThreadStart
12 ntdll!_RtlUserThreadStart

kd> .process
Implicit process is now 898ac998
kd> !process 898ac998
PROCESS 898ac998  SessionId: 0  Cid: 01e0    Peb: 7ffd5000  ParentCid: 0190
DirBase: 7cc9e0e0  ObjectTable: 8c00f530  HandleCount: 523.
Image: lsass.exe
VadRoot 89089550 Vads 122 Clone 0 Private 1022. Modified 205. Locked 14.
DeviceMap 8ba09a00
Token                             8c015510
ElapsedTime                       17:11:04.313
UserTime                          00:00:00.436
KernelTime                        00:00:00.967
QuotaPoolUsage[PagedPool]         99748
QuotaPoolUsage[NonPagedPool]      13512
Working Set Sizes (now,min,max)  (2777, 50, 345) (11108KB, 200KB, 1380KB)
PeakWorkingSetSize                2887
VirtualSize                       36 Mb
PeakVirtualSize                   37 Mb
PageFaultCount                    3607
MemoryPriority                    BACKGROUND
BasePriority                      9
CommitCharge                      1160


kd> r
eax=747c2ad8 ebx=0000000c ecx=747c1b9c edx=00000000 esi=00000010 edi=0131f740
eip=7712ab24 esp=0131f558 ebp=0131f95c iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202
RPCRT4!Invoke:
001b:7712ab24 55              push    ebp
kd> dd 0131f558
0131f558  77136482 747c2ad8 0131f740 00000010
0131f568  201a4c3a 00f5b000 00000000 00f9c548
0131f578  00f9c548 00213210 00213058 00213210
0131f588  002131a8 00000000 00000018 002131a8
0131f598  00000000 00000000 00000000 00000000
0131f5a8  00000000 00000000 00000002 00000020
0131f5b8  00000000 00000008 747c2008 747c2029
0131f5c8  0131f740 00f9c04c 0131f678 8a885d04
kd> u 747c2ad8
SspiSrv!SspirLogonUser:

747c2ad8 8bff            mov     edi,edi
747c2ada 55              push    ebp
747c2adb 8bec            mov     ebp,esp
747c2add 83ec34          sub     esp,34h
747c2ae0 53              push    ebx
747c2ae1 33db            xor     ebx,ebx
747c2ae3 56              push    esi
747c2ae4 57              push    edi


kd> kc
#
00 SspiSrv!SspirLogonUser
01 RPCRT4!Invoke

02 RPCRT4!NdrStubCall2
03 RPCRT4!NdrServerCall2
04 RPCRT4!DispatchToStubInCNoAvrf
05 RPCRT4!RPC_INTERFACE::DispatchToStubWorker
06 RPCRT4!RPC_INTERFACE::DispatchToStub
07 RPCRT4!LRPC_SCALL::DispatchRequest
08 RPCRT4!LRPC_SCALL::QueueOrDispatchCall
09 RPCRT4!LRPC_SCALL::HandleRequest
0a RPCRT4!LRPC_SASSOCIATION::HandleRequest
0b RPCRT4!LRPC_ADDRESS::HandleRequest
0c RPCRT4!LRPC_ADDRESS::ProcessIO
0d RPCRT4!LrpcServerIoHandler
0e RPCRT4!LrpcIoComplete
0f ntdll!TppAlpcpExecuteCallback
10 ntdll!TppWorkerThread
11 kernel32!BaseThreadInitThunk
12 ntdll!__RtlUserThreadStart
13 ntdll!_RtlUserThreadStart

kd> r
eax=747c2ad8 ebx=0000000c ecx=00000000 edx=00000000 esi=0131f73c edi=0131f504
eip=747c2ad8 esp=0131f504 ebp=0131f554 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202
SspiSrv!SspirLogonUser:
001b:747c2ad8 8bff            mov     edi,edi
kd> dd 0131f504
0131f504  7712ab4e 0089b2e0 00213070 00213080
0131f514  00000002 00000000 00899a80 00213190
0131f524  002131a8 00000080 002131f0 00fa2f50
0131f534  00fa2f60 00fa2f70 00fa2f80 00fa2f90
0131f544  00fa2fa0 00000202 00000010 0131f740
0131f554  0131f95c 77136482 747c2ad8 0131f740
0131f564  00000010 201a4c3a 00f5b000 00000000
0131f574  00f9c548 00f9c548 00213210 00213058


kd> db 00213080
00213080  08 00 09 00 50 9a 89 00-09 00 00 00 00 00 00 00  ....P...........
00213090  08 00 00 00 57 69 6e 6c-6f 67 6f 6e 02 00 00 00  ....Winlogon....
002130a0  00 00 00 00 00 00 00 00-ce 00 00 00 00 00 00 00  ................
002130b0  00 00 1a 00 00 00 00 00-c0 30 21 00 ce 00 00 00  .........0!.....
002130c0  02 00 00 00 1e 00 1e 00-24 00 00 00 1a 00 1a 00  ........$.......
002130d0  42 00 00 00 72 00 72 00-5c 00 00 00 00 00 00 00  B...r.r.\.......
002130e0  00 00 00 00 57 00 49 00-4e 00 2d 00 33 00 53 00  ....W.I.N.-.3.S.
002130f0  50 00 47 00 32 00 44 00-4b 00 48 00 55 00 4b 00  P.G.2.D.K.H.U.K.
kd> db 00213080+80
00213100  4b 00 41 00 64 00 6d 00-69 00 6e 00 69 00 73 00  K.A.d.m.i.n.i.s.
00213110  74 00 72 00 61 00 74 00-6f 00 72 00 40 00 40 00  t.r.a.t.o.r.@.@.
00213120  44 00 07 00 08 00 0c 00-0a 00 0d 00 67 00 41 00  D...........g.A.
00213130  41 00 41 00 41 00 41 00-6e 00 50 00 41 00 41 00  A.A.A.A.n.P.A.A.
00213140  41 00 41 00 41 00 41 00-41 00 41 00 67 00 50 00  A.A.A.A.A.A.g.P.
00213150  30 00 37 00 54 00 57 00-48 00 6e 00 46 00 79 00  0.7.T.W.H.n.F.y.
00213160  66 00 49 00 31 00 4a 00-36 00 53 00 44 00 23 00  f.I.1.J.6.S.D.#.
00213170  39 00 36 00 38 00 51 00-31 00 4b 00 51 00 4b 00  9.6.8.Q.1.K.Q.K.
kd> db 00213080+80*2
00213180  58 00 76 00 48 00 45 00-32 00 39 00 46 00 00 00  X.v.H.E.2.9.F...
00213190  55 73 65 72 33 32 20 00-cd cd 0c 00 00 00 00 00  User32 .........
002131a0  a8 31 21 00 02 00 00 00-02 00 00 00 c0 31 21 00  .1!..........1!.
002131b0  07 00 00 c0 d8 31 21 00-07 00 00 00 03 00 00 00  .....1!.........

kd> g
Breakpoint 11 hit
eax=0131ec48 ebx=00000000 ecx=74c26c9f edx=00000358 esi=771d1981 edi=0000003a
eip=771d1981 esp=0131ec14 ebp=0131ec54 iopl=0         nv up ei pl zr na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
ADVAPI32!CredUnprotectW:
001b:771d1981 8bff            mov     edi,edi
kd> kc
#
00 ADVAPI32!CredUnprotectW
01 kerberos!KerbDecodeSecret
02 kerberos!LsaApLogonUserEx2
03 lsasrv!NegLogonUserEx2Worker
04 lsasrv!NegLogonUserEx2
05 lsasrv!LsapCallAuthPackageForLogon
06 lsasrv!LsapAuApiDispatchLogonUser
07 lsasrv!SspiExLogonUser
08 SspiSrv!SspirLogonUser
09 RPCRT4!Invoke
0a RPCRT4!NdrStubCall2
0b RPCRT4!NdrServerCall2
0c RPCRT4!DispatchToStubInCNoAvrf
0d RPCRT4!RPC_INTERFACE::DispatchToStubWorker
0e RPCRT4!RPC_INTERFACE::DispatchToStub
0f RPCRT4!LRPC_SCALL::DispatchRequest
10 RPCRT4!LRPC_SCALL::QueueOrDispatchCall
11 RPCRT4!LRPC_SCALL::HandleRequest
12 RPCRT4!LRPC_SASSOCIATION::HandleRequest
13 RPCRT4!LRPC_ADDRESS::HandleRequest
14 RPCRT4!LRPC_ADDRESS::ProcessIO
15 RPCRT4!LrpcServerIoHandler
16 RPCRT4!LrpcIoComplete
17 ntdll!TppAlpcpExecuteCallback
18 ntdll!TppWorkerThread
19 kernel32!BaseThreadInitThunk
1a ntdll!__RtlUserThreadStart
1b ntdll!_RtlUserThreadStart

kd> .process
Implicit process is now 898ac998

kd> r
eax=0131ec48 ebx=00000000 ecx=74c26c9f edx=00000358 esi=771d1981 edi=0000003a
eip=771d1981 esp=0131ec14 ebp=0131ec54 iopl=0         nv up ei pl zr na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
ADVAPI32!CredUnprotectW:
001b:771d1981 8bff            mov     edi,edi
kd> dd 0131ec14
0131ec14  743a56dd 00000000 00899b98 0000003a
0131ec24  00000000 0131ec48 00899ab8 00899acc
0131ec34  00000000 00000000 00000000 00000002
0131ec44  00000000 00000000 00000000 00899acc
0131ec54  0131ef38 743ae5b4 00899b98 00000000
0131ec64  0131ee5c 00000010 761951f4 c000005e
0131ec74  0000174c 00001c00 000004b4 00000000
0131ec84  76d7421e 0003174c 41c8e6fc 0131ece0
kd> db 00899b98
00899b98  40 00 40 00 44 00 07 00-08 00 0c 00 0a 00 0d 00  @.@.D...........
00899ba8  67 00 41 00 41 00 41 00-41 00 41 00 6e 00 50 00  g.A.A.A.A.A.n.P.
00899bb8  41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00  A.A.A.A.A.A.A.A.
00899bc8  67 00 50 00 30 00 37 00-54 00 57 00 48 00 6e 00  g.P.0.7.T.W.H.n.
00899bd8  46 00 79 00 66 00 49 00-31 00 4a 00 36 00 53 00  F.y.f.I.1.J.6.S.
00899be8  44 00 23 00 39 00 36 00-38 00 51 00 31 00 4b 00  D.#.9.6.8.Q.1.K.
00899bf8  51 00 4b 00 58 00 76 00-48 00 45 00 32 00 39 00  Q.K.X.v.H.E.2.9.
00899c08  46 00 00 00 00 00 00 00-2c 00 00 00 11 00 00 00  F.......,.......
kd> dd 0131ec48
0131ec48  00000000 00000000 00899acc 0131ef38
0131ec58  743ae5b4 00899b98 00000000 0131ee5c
0131ec68  00000010 761951f4 c000005e 0000174c
0131ec78  00001c00 000004b4 00000000 76d7421e
0131ec88  0003174c 41c8e6fc 0131ece0 76ce2cf2
0131ec98  0131edc4 0000006c 00000001 0131ed30
0131eca8  0003174c c0150008 00000000 000004b4
0131ecb8  00000002 0131ed34 c0150008 00000000
kd> gu
eax=00000000 ebx=00000000 ecx=00000000 edx=0000007a esi=771d1981 edi=0000003a
eip=743a56dd esp=0131ec2c ebp=0131ec54 iopl=0         nv up ei pl zr na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246
kerberos!KerbDecodeSecret+0x13b:
001b:743a56dd 85c0            test    eax,eax
kd> dd 0131ec48
0131ec48  00000009 00000000 00899acc 0131ef38
0131ec58  743ae5b4 00899b98 00000000 0131ee5c
0131ec68  00000010 761951f4 c000005e 0000174c
0131ec78  00001c00 000004b4 00000000 76d7421e
0131ec88  0003174c 41c8e6fc 0131ece0 76ce2cf2
0131ec98  0131edc4 0000006c 00000001 0131ed30
0131eca8  0003174c c0150008 00000000 000004b4
0131ecb8  00000002 0131ed34 c0150008 00000000
kd> db 00899b98
00899b98  40 00 40 00 44 00 07 00-08 00 0c 00 0a 00 0d 00  @.@.D...........
00899ba8  67 00 41 00 41 00 41 00-41 00 41 00 6e 00 50 00  g.A.A.A.A.A.n.P.
00899bb8  41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00  A.A.A.A.A.A.A.A.
00899bc8  67 00 50 00 30 00 37 00-54 00 57 00 48 00 6e 00  g.P.0.7.T.W.H.n.
00899bd8  46 00 79 00 66 00 49 00-31 00 4a 00 36 00 53 00  F.y.f.I.1.J.6.S.
00899be8  44 00 23 00 39 00 36 00-38 00 51 00 31 00 4b 00  D.#.9.6.8.Q.1.K.
00899bf8  51 00 4b 00 58 00 76 00-48 00 45 00 32 00 39 00  Q.K.X.v.H.E.2.9.
00899c08  46 00 00 00 00 00 00 00-2c 00 00 00 11 00 00 00  F.......,.......

kd> g
Breakpoint 11 hit
eax=00899c20 ebx=00000000 ecx=0131ec48 edx=00000000 esi=771d1981 edi=0000003a
eip=771d1981 esp=0131ec14 ebp=0131ec54 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202
ADVAPI32!CredUnprotectW:
001b:771d1981 8bff            mov     edi,edi
kd> kc
#
00 ADVAPI32!CredUnprotectW
01 kerberos!KerbDecodeSecret
02 kerberos!LsaApLogonUserEx2

03 lsasrv!NegLogonUserEx2Worker
04 lsasrv!NegLogonUserEx2
05 lsasrv!LsapCallAuthPackageForLogon
06 lsasrv!LsapAuApiDispatchLogonUser
07 lsasrv!SspiExLogonUser
08 SspiSrv!SspirLogonUser
09 RPCRT4!Invoke
0a RPCRT4!NdrStubCall2
0b RPCRT4!NdrServerCall2
0c RPCRT4!DispatchToStubInCNoAvrf
0d RPCRT4!RPC_INTERFACE::DispatchToStubWorker
0e RPCRT4!RPC_INTERFACE::DispatchToStub
0f RPCRT4!LRPC_SCALL::DispatchRequest
10 RPCRT4!LRPC_SCALL::QueueOrDispatchCall
11 RPCRT4!LRPC_SCALL::HandleRequest
12 RPCRT4!LRPC_SASSOCIATION::HandleRequest
13 RPCRT4!LRPC_ADDRESS::HandleRequest
14 RPCRT4!LRPC_ADDRESS::ProcessIO
15 RPCRT4!LrpcServerIoHandler
16 RPCRT4!LrpcIoComplete
17 ntdll!TppAlpcpExecuteCallback
18 ntdll!TppWorkerThread
19 kernel32!BaseThreadInitThunk
1a ntdll!__RtlUserThreadStart
1b ntdll!_RtlUserThreadStart


kd> r
eax=00899c20 ebx=00000000 ecx=0131ec48 edx=00000000 esi=771d1981 edi=0000003a
eip=771d1981 esp=0131ec14 ebp=0131ec54 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202
ADVAPI32!CredUnprotectW:
001b:771d1981 8bff            mov     edi,edi
kd> dd d0131ec14
0131ec14  743a571f 00000000 00899b98 0000003a
0131ec24  00899c20 0131ec48
00899ab8 00899acc
0131ec34  00000000 00000000 00000000 00000002
0131ec44  00000012 00000009 00899c20 00899acc
0131ec54  0131ef38 743ae5b4 00899b98 00000000
0131ec64  0131ee5c 00000010 761951f4 c000005e
0131ec74  0000174c 00001c00 000004b4 00000000
0131ec84  76d7421e 0003174c 41c8e6fc 0131ece0
kd> dd 00899c20
00899c20  00000000 00000000 00000000 00000000
00899c30  00000000 00000000 00000027 00000005
00899c40  0089e6e8 00893078 00000000 00000000
00899c50  00000000 00000000 00000000 00000000
00899c60  00000000 00000000 00000021 00000022
00899c70  0089ec10 00899a70 00899c90 00000000
00899c80  0000001e 00000043 0089eaa0 0089e718
00899c90  00000001 00000000 00000000 00000000
kd> dd 0131ec48
0131ec48  00000009
00899c20 00899acc 0131ef38
0131ec58  743ae5b4 00899b98 00000000 0131ee5c
0131ec68  00000010 761951f4 c000005e 0000174c
0131ec78  00001c00 000004b4 00000000 76d7421e
0131ec88  0003174c 41c8e6fc 0131ece0 76ce2cf2
0131ec98  0131edc4 0000006c 00000001 0131ed30
0131eca8  0003174c c0150008 00000000 000004b4
0131ecb8  00000002 0131ed34 c0150008 00000000
kd> gu
eax=00000001 ebx=00000000 ecx=74c26c9f edx=00000358 esi=771d1981 edi=0000003a
eip=743a571f esp=0131ec2c ebp=0131ec54 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202
kerberos!KerbDecodeSecret+0x17d:
001b:743a571f 85c0            test    eax,eax
kd> dd 00899c20
00899c20  00320031 00340033 00360035 00380037
00899c30  00000000 00000000 00000027 00000005
00899c40  0089e6e8 00893078 00000000 00000000
00899c50  00000000 00000000 00000000 00000000
00899c60  00000000 00000000 00000021 00000022
00899c70  0089ec10 00899a70 00899c90 00000000
00899c80  0000001e 00000043 0089eaa0 0089e718
00899c90  00000001 00000000 00000000 00000000
kd> db 00899c20
00899c20  31 00 32 00 33 00 34 00-35 00 36 00 37 00 38 00  1.2.3.4.5.6.7.8.
00899c30  00 00 00 00 00 00 00 00-27 00 00 00 05 00 00 00  ........'.......

00899c40  e8 e6 89 00 78 30 89 00-00 00 00 00 00 00 00 00  ....x0..........

kd> g
480.856> Kerb-Error: LogonUser returned c000005e, 0
Breakpoint 19 hit
eax=000d3d68 ebx=c000005e ecx=00000001 edx=00000002 esi=761951f4 edi=0000000a
eip=7429554f esp=0131ef3c ebp=0131f00c iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202
msv1_0!LsaApLogonUserEx2:
001b:7429554f 8bff            mov     edi,edi
kd> kc
#
00 msv1_0!LsaApLogonUserEx2
01 lsasrv!NegLogonUserEx2Worker
02 lsasrv!NegLogonUserEx2
03 lsasrv!LsapCallAuthPackageForLogon
04 lsasrv!LsapAuApiDispatchLogonUser
05 lsasrv!SspiExLogonUser
06 SspiSrv!SspirLogonUser
07 RPCRT4!Invoke
08 RPCRT4!NdrStubCall2
09 RPCRT4!NdrServerCall2
0a RPCRT4!DispatchToStubInCNoAvrf
0b RPCRT4!RPC_INTERFACE::DispatchToStubWorker
0c RPCRT4!RPC_INTERFACE::DispatchToStub
0d RPCRT4!LRPC_SCALL::DispatchRequest
0e RPCRT4!LRPC_SCALL::QueueOrDispatchCall
0f RPCRT4!LRPC_SCALL::HandleRequest
10 RPCRT4!LRPC_SASSOCIATION::HandleRequest
11 RPCRT4!LRPC_ADDRESS::HandleRequest
12 RPCRT4!LRPC_ADDRESS::ProcessIO
13 RPCRT4!LrpcServerIoHandler
14 RPCRT4!LrpcIoComplete
15 ntdll!TppAlpcpExecuteCallback
16 ntdll!TppWorkerThread
17 kernel32!BaseThreadInitThunk
18 ntdll!__RtlUserThreadStart
19 ntdll!_RtlUserThreadStart

kd> r
eax=000d3d68 ebx=c000005e ecx=00000001 edx=00000002 esi=761951f4 edi=0000000a
eip=7429554f esp=0131ef3c ebp=0131f00c iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202
msv1_0!LsaApLogonUserEx2:
001b:7429554f 8bff            mov     edi,edi
kd> dd 0131ef3c
0131ef3c  746ea808 0131f394 00000002 00899ab8
0131ef4c  001a0000 000000ce 0131f314 0131f318
0131ef5c  0131f320 0131f310 0131f26c 0131f280
0131ef6c  0131f27c 0131f278 0131f240 0131f18c
0131ef7c  0131f238 6b637453 00890000 000c8140
0131ef8c  000d3d68 5552890b fffffffe 7477c0a1
0131ef9c  7477c0a1 746ea5c3 0131f08c 000c70b8
0131efac  000000ce 000fc9b8 00000002 000fc9b7


THREAD 81ec5930  Cid 0708.0de8  Teb: 7ffdd000 Win32Thread: ff2b2dd0 WAIT: (WrLpcReply) UserMode Non-Alertable
81ec5b64  Semaphore Limit 0x1
Waiting for reply to ALPC Message 9a7db848 : queued at port 8c26ebf8 : owned by process 898ac998
Not impersonating
DeviceMap                 8ba09a00
Owning Process            81ea2030       Image:         winlogon.exe
Attached Process          N/A            Image:         N/A
Wait Start TickCount      275120916      Ticks: 10 (0:00:00:00.156)
Context Switch Count      142            IdealProcessor: 0
UserTime                  00:00:00.015
KernelTime                00:00:00.592
Win32 Start Address ntdll!TppWorkerThread (0x76d612fe)
Stack Init 8255afd0 Current 8255aaa0 Base 8255b000 Limit 82558000 Call 00000000
Priority 14 BasePriority 13 PriorityDecrement 0 IoPriority 2 PagePriority 5
ChildEBP RetAddr
8255aab8 82877fae nt!KiSwapContext+0x26 (FPO: [Uses EBP] [0,0,4])
8255aaf0 82879583 nt!KiSwapThread+0x394
8255ab18 8286aa1d nt!KiCommitThreadWait+0x461
8255ab8c 8287db0c nt!KeWaitForSingleObject+0x505
8255abbc 82dbcd1a nt!AlpcpSignalAndWait+0x142
8255abfc 82df4fa3 nt!AlpcpReceiveSynchronousReply+0x8e
8255aca0 82df7b81 nt!AlpcpProcessSynchronousRequest+0xaf9
8255ad0c 829ad913 nt!NtAlpcSendWaitReceivePort+0x1a9
8255ad0c 76cea084 nt!KiFastCallEntry+0x163 (FPO: [0,3] TrapFrame @ 8255ad34)
00c4ef04 76cc03c0 ntdll!KiFastSystemCallRet (FPO: [0,0,0])
00c4ef08 770caf06 ntdll!ZwAlpcSendWaitReceivePort+0xc (FPO: [8,0,0])
00c4ef40 770ddb19 RPCRT4!LRPC_CASSOCIATION::AlpcSendWaitReceivePort+0xcb
00c4ef90 770db93d RPCRT4!LRPC_BASE_CCALL::DoSendReceive+0xf2
00c4efb4 770e11c5 RPCRT4!LRPC_BASE_CCALL::SendReceive+0x8f
00c4efc4 7709619e RPCRT4!LRPC_CCALL::SendReceive+0x1e
00c4efe4 77109adf RPCRT4!I_RpcSendReceive+0xad
00c4f000 771107e0 RPCRT4!NdrSendReceive+0x50
00c4f010 77135bb2 RPCRT4!NdrpSendReceive+0xc (FPO: [0,1,0])
00c4f428 748a45e3 RPCRT4!NdrClientCall2+0x1ce
00c4f444 74897168 SspiCli!SspirLogonUser+0x1a (FPO: [Non-Fpo])
00c4f544 0058706e SspiCli!SspipLogonUser+0x138 (FPO: [Non-Fpo])
00c4f668 00587c91 winlogon!AuthenticateUser+0x840 (FPO: [Non-Fpo])
00c4f780 0059e996 winlogon!WLGeneric_Authenticating_Execute+0x1b3 (FPO: [Non-Fpo])

00c4f798 76d5dda1 winlogon!StateMachineWorkerCallback+0x67 (FPO: [Non-Fpo])
00c4f7bc 76d618e5 ntdll!TppWorkpExecuteCallback+0x121 (FPO: [Non-Fpo])
00c4f920 76197647 ntdll!TppWorkerThread+0x5e7 (FPO: [Non-Fpo])
00c4f92c 76cf0683 kernel32!BaseThreadInitThunk+0xe (FPO: [Non-Fpo])
00c4f96c 76cf08df ntdll!__RtlUserThreadStart+0x23 (FPO: [Non-Fpo])
00c4f984 00000000 ntdll!_RtlUserThreadStart+0x1b (FPO: [Non-Fpo])

本文标签: 调用路径 登陆过程 解码