On Windows Syscall Mechanism and Syscall Numbers Extraction Methods

Share Embed Donate


Short Description

Everyone who's familiar with operating systems theoretical structure, whether he attented a college course or he ha...

Description

evilsocket.net

On Windows syscall mechanism and syscall numbers extraction methods Everyone who's familiar with operating systems theoretical structure, whether he attented a college course or he has just read a book on this subject, knows the concept of a system call i.e. how a user space application talks with the kernel asking it to perform various jobs such as opening a file, creating a memory mapped region, etc. Those system calls are usually described as putting some value ( the syscall number ) in a CPU register and then call an OS dependant interrupt, for instance ( the syscall number here was totally invented, just showing you an example ) mov eax, 0x1234 lea edx, [esp+4] int 0x2E This piece of assembly code would invoke the 0x1234 syscall on a 32bit Windows 2000 system, but this mechanism had deeply changed starting from Windows XP and later versions. XP, SYSENTER and KiFastSystemCall Windows XP was the first version of the Microsoft OS which introduced the KiFastSystemCall mechanism, look at the following code which is basically the same as the previous one: mov eax, 0x1234 mov edx, address of ntdll!KiFastSystemCall call edx retn 8 If we disassemble the KiFastSystemCall symbol exported by ntdll.dll we find the following code: mov edx, esp sysenter retn Notice the sysenter operator, as stated by the Intel instruction set reference manual ( vol. 2 p. 721 ) : The SYSENTER instruction is part of the "Fast System Call" facility introduced on the PentiumĀ® II processor. The SYSENTER instruction is optimized to provide the maximum

performance for transitions to protection ring 0 (CPL = 0). The SYSENTER and SYSEXIT instructions do not constitute a call/return pair; therefore, the system call "stub" routines executed by user code (typically in shared libraries or DLLs) must perform the required register state save to create a system call/return pair. The SYSENTER instruction always transfers to a flat protected mode kernel at CPL = 0. SYSENTER can be invoked from all modes except real mode. So this is basically a new opcode introduced by Intel which makes swapping from Ring 3 to Ring 0 and back faster than it was with the old interrupt call. 64bit Systems You will find that on 64bit systems things are slightly different ( I've just tested this on a Windows 7 SP1 64bit installation, please correct me if I'm wrong for other OS versions ), if we take a look at the code of NtCreateFile inside ntdll, the code is: mov

r10, rcx

mov

eax, 52h

syscall retn As you can see there's no call to KiFastSystemCall, instead the eax register is filled with the syscall number ( 52h in this case ) and sysenter is called directly by the NT API, but what about 32bit applications running under a WOW64 environment ? Just WOW64 Obviously there's some trick behind it, how a 32bit application could ask a 64bit processor to perform a transition from Ring3 to Ring0? As you probably know, Windows has a subsystem called WOW64 which acts as an emulation layer for 32bit apps under 64bit architectures. Among other things WOW64 is composed by a full set of 32bit stub/proxy libraries who make the app run without problems while WOW manages the switch between 32bit and 64bit OS code. An example of the KiFastSystemCall mechanism under WOW64 would be ( always talking about NtCreateFile ) mov

eax,52h

xor

ecx,ecx

lea

edx,[esp+04h]

call add retn

fs:[C0h] esp,04h 002Ch

Very similar to the 32bit counterpart, but this time the call is towards FS:C0h, a field in the TIB which contains a

pointer to another call. So let's try to see what's in there with the following C application. #include #include int main(int argc, char* argv[]) { printf( "FS:[C0h]

: %08X\n", __readfsdword(0xc0) );

printf( "KiFastSystemCall : %08X\n", GetProcAddress( GetModuleHandle("ntdll"), "KiFastSystemCall" ) ); } On my computer this program prints the following results: FS:[C0h]

: 75452320

KiFastSystemCall : 77B101D0 It is clear that we're not invoking KiFastSystemCall anymore, so what's at address 75452320 and by whom is contained? Nothing OllyDbg can't find out :)

Wait, what?! An anonymous memory region? Let's go deeper ...

And this is where the transition from 32bit to 64bit code occurs, with a far jump to 7545271E with the code segment being set at 33h, i.e. a jmp to the symbol CpupReturnFromSimulatedCode of wow64cpu.dll, a 64bit library which is always loaded into a 32bit application address space but it's hidden from the PEB by the OS itself ( that's why Olly saw it as an anonymous memory region ). Going deeper in its content we would see that the syscall is performed just as we saw before, setting the proper syscall number and then calling the real KiFastSystemCall from 64bit ntdll.dll. Using raw system calls instead of normal high level API is obviously unusual and unnecessarily uncomfortable, except if you want to evade some monitoring/hooking software and obtain a basic code obfuscation ... think about it, you won't use any API but just set up some registers and then calling sysenter, isn't it cool ? :) The problem here is on every Windows version, and among each service pack too syscall numbers may vary and there's no official way to obtain the correct values for the system your application is running on. By "official ways" I mean there's no API Microsoft implemented to have this information, but we can always extract those values from the ntdll library we can find during runtime. We can load it with a simple LoadLibrary, obtain a pointer to the API we're interested in ( let's say NtCreateFile ) with GetProcAddress and examine the first opcodes in it ... would't it be cool if we could achieve the same result without loading the library but manually inspecting its content as a portable executable file? Of course it would, we can easily open ntdll.dll, inspect its export directory, obtain the RVA and raw offset of NtCreateFile and then check the first bytes of opcodes. We've to expect the first byte to be B8h which is a MOV EAX, IMM32 so we can take the four next bytes and have our syscall number. The following is an example program I've made for this purpose, it parses ntdll export directory and prints a table with each syscall number, RVA and relative API name.

#include #include #define IS_ADDRESS_BETWEEN( left, right, address ) ( (address) >= (left) && (address) < (right) ) PIMAGE_SECTION_HEADER SectionByRVA( PIMAGE_SECTION_HEADER pSections, DWORD dwSections, DWORD rva ) { PIMAGE_SECTION_HEADER pSectionHeader = pSections; DWORD i; for( i = 0; i < dwSections; i++, pSectionHeader++ ) { // Is the RVA within this section? if( IS_ADDRESS_BETWEEN( pSectionHeader->VirtualAddress, ( pSectionHeader->VirtualAddress + pSectionHeader->SizeOfRawData ), rva ) ) return pSectionHeader; } return 0; } DWORD RawOffsetByRVA( PIMAGE_SECTION_HEADER pSections, DWORD dwSections, DWORD dwFileSize, DWORD rva ) { PIMAGE_SECTION_HEADER pSectionHeader; DWORD dwOffset, dwDelta; pSectionHeader = SectionByRVA( pSections, dwSections, rva ); if ( !pSectionHeader ) { return 0; } dwDelta

= rva - pSectionHeader->VirtualAddress;

dwOffset = pSectionHeader->PointerToRawData + dwDelta; if( dwOffset >= dwFileSize ) return 0; else {

return dwOffset; } } #define GET_POINTER(RVA) ( pBuffer + RawOffsetByRVA( Sections, dwSections, dwFileSize, (RVA) ) ) int main(int argc, char* argv[]) { HANDLE hFile = INVALID_HANDLE_VALUE, hMap

= NULL;

PBYTE pBuffer = NULL, pOps = NULL; DWORD dwFileSize = 0, dwSizeOfHeaders = 0, dwSections = 0, dwBaseAddress = 0, dwImageSize = 0, dwExportRVA

= 0,

dwExportSize = 0, dwExportRaw

= 0,

dwExports = 0; PDWORD pdwFunctions, pszFunctionNames; PWORD

pwOrdinals;

PIMAGE_NT_HEADERS

NTHeader;

PIMAGE_DOS_HEADER

DOSHeader;

PIMAGE_SECTION_HEADER Sections; PIMAGE_EXPORT_DIRECTORY pExportDirectory; hFile = CreateFile ( "c:\\windows\\system32\\ntdll.dll", GENERIC_READ, FILE_SHARE_READ | FILE_SHARE_DELETE, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL ); if( hFile == INVALID_HANDLE_VALUE ) { fprintf( stderr, "Could not open file: %08X\n", GetLastError() );

goto done; } dwFileSize = GetFileSize( hFile, NULL ); hMap = CreateFileMapping( hFile, NULL, PAGE_READONLY, 0, 0, NULL ); if( hMap == NULL ) { fprintf( stderr, "Could not create memory map: %08X\n", GetLastError() ); goto done; } pBuffer = (PBYTE)MapViewOfFile( hMap, FILE_MAP_READ, 0, 0, 0 ); if( hMap == NULL ) { fprintf( stderr, "Could not obtain memory map view: %08X\n", GetLastError() ); goto done; } if( pBuffer[0] != 'M' || pBuffer[1] != 'Z' ) { fprintf( stderr, "Unexpected file header.\n" ); goto done; } // start reading PE headers DOSHeader = (PIMAGE_DOS_HEADER)pBuffer; NTHeader

= (PIMAGE_NT_HEADERS)( pBuffer + DOSHeader->e_lfanew );

dwSizeOfHeaders = NTHeader->OptionalHeader.SizeOfHeaders; dwBaseAddress

= NTHeader->OptionalHeader.ImageBase;

dwImageSize

= NTHeader->OptionalHeader.SizeOfImage;

dwSections

= NTHeader->FileHeader.NumberOfSections;

// get first section header Sections = (PIMAGE_SECTION_HEADER) ( pBuffer + DOSHeader->e_lfanew + sizeof(IMAGE_NT_HEADERS) );

// now parse the export directory dwExportRVA

=

NTHeader->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_EXPORT].VirtualAddress; dwExportSize = NTHeader->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_EXPORT].Size; dwExportRaw

= RawOffsetByRVA( Sections, dwSections, dwFileSize, dwExportRVA );

if( !dwExportRVA || !dwExportSize || !dwExportRaw ) { fprintf( stderr, "Unexpected export directory structure.\n" ); goto done; } pExportDirectory = (PIMAGE_EXPORT_DIRECTORY)( pBuffer + dwExportRaw ); pdwFunctions

= (PDWORD)GET_POINTER( pExportDirectory->AddressOfFunctions );

pwOrdinals

= (PWORD)GET_POINTER( pExportDirectory->AddressOfNameOrdinals

); pszFunctionNames = (PDWORD)GET_POINTER( pExportDirectory->AddressOfNames ); dwExports

= pExportDirectory->NumberOfNames;

printf( "SYSCALL

RVA

NAME\n" );

printf( "-----------------------------------------------\n" ); // loop each exported symbol by name for( DWORD i = 0; i < pExportDirectory->NumberOfNames; ++i ) { DWORD dwNameRVA = pszFunctionNames[ i ], dwApiRVA

= pdwFunctions[ pwOrdinals[ i ] ],

dwSyscall = 0, dwApiRaw

= RawOffsetByRVA( Sections, dwSections, dwFileSize,

dwApiRVA ), dwNameRaw = RawOffsetByRVA( Sections, dwSections, dwFileSize, dwNameRVA ); pOps = pBuffer + dwApiRaw; /* * Check if the API entry begins with: * *

MOV

EAX, IMM32

*

XOR

ECX, ECX

*

LEA

EDX, [ESP+04h]

*

CALL FS:[C0h]

* * Or * *

MOV

EAX, IMM32

*

MOV

ECX, IMM32

*

LEA

EDX, [ESP+04h]

*

CALL FS:[C0h]

*/ if( pOps[0] == 0xB8 &&

// mov

eax, imm32 ( ( pOps[5] == 0x33 && pOps[6] == 0xC9 &&

// xor

!memcmp( &pOps[7],

// lea

ecx, ecx "\x8D\x54\x24\x04", 4 ) &&

edx, [esp+04h] !memcmp( &pOps[11], "\x64\xFF\x15\xC0\x00\x00\x00", 7 ) // call fs:[C0h] ) || ( pOps[5] == 0xB9 &&

// mov

!memcmp( &pOps[10], "\x8D\x54\x24\x04", 4 ) &&

// lea

ecx, imm32 edx, [esp+04h] !memcmp( &pOps[13], "\x64\xFF\x15\xC0\x00\x00\x00", 7 ) // call fs:[C0h] ) ) ) { /* * Extract the IMM32 part, this is our syscall number. */ dwSyscall

= *(DWORD *)( pOps + 1 );

printf( "%08X pBuffer + dwNameRaw ); } }

%08X

%s\n", dwSyscall, dwBaseAddress + dwApiRVA,

done: if( hFile != INVALID_HANDLE_VALUE ) { CloseHandle( hFile ); } if( pBuffer != NULL ) { UnmapViewOfFile( pBuffer ); } if( hMap != NULL ) { CloseHandle( hMap ); } return 0; } On my Windows 7 computer the output is: SYSCALL

RVA

NAME

----------------------------------------------00000060

7DE90210

NtAcceptConnectPort

00000061

7DE90228

NtAccessCheck

00000026

7DE8FC68

NtAccessCheckAndAuditAlarm

00000062

7DE90240

NtAccessCheckByType

00000056

7DE90114

NtAccessCheckByTypeAndAuditAlarm

00000063

7DE90258

NtAccessCheckByTypeResultList

00000064

7DE90270

NtAccessCheckByTypeResultListAndAuditAlarm

00000065

7DE90288

NtAccessCheckByTypeResultListAndAuditAlarmByHandle

00000066

7DE902A0

NtAddBootEntry

00000067

7DE902B8

NtAddDriverEntry

00000068

7DE902D0

NtAdjustGroupsToken

0000003E

7DE8FEC0

NtAdjustPrivilegesToken

0000006C

7DE9033C

NtAllocateReserveObject

0000006D

7DE90354

NtAllocateUserPhysicalPages

00000015

7DE8FAC0

NtAllocateVirtualMemory

0000006F

7DE90388

NtAlpcAcceptConnectPort

00000070

7DE903A0

NtAlpcCancelMessage

00000071

7DE903B8

NtAlpcConnectPort

00000072

7DE903D0

NtAlpcCreatePort

00000073

7DE903E8

NtAlpcCreatePortSection

00000074

7DE90400

NtAlpcCreateResourceReserve

00000075

7DE90418

NtAlpcCreateSectionView

00000076

7DE90430

NtAlpcCreateSecurityContext

00000077

7DE90448

NtAlpcDeletePortSection

00000078

7DE90460

NtAlpcDeleteResourceReserve

00000079

7DE90478

NtAlpcDeleteSectionView

0000007A

7DE90490

NtAlpcDeleteSecurityContext

0000007B

7DE904A8

NtAlpcDisconnectPort

0000007C

7DE904C0

NtAlpcImpersonateClientOfPort

0000007D

7DE904D8

NtAlpcOpenSenderProcess

0000007E

7DE904F0

NtAlpcOpenSenderThread

0000007F

7DE90508

NtAlpcQueryInformation

00000080

7DE90520

NtAlpcQueryInformationMessage

00000081

7DE90538

NtAlpcRevokeSecurityContext

00000082

7DE90550

NtAlpcSendWaitReceivePort

00000083

7DE90568

NtAlpcSetInformation

00000049

7DE8FFD4

NtApphelpCacheControl

00000002

7DE8F8D8

NtCallbackReturn

0000005A

7DE9017C

NtCancelIoFile

00000086

7DE905B8

NtCancelIoFileEx

00000087

7DE905D0

NtCancelSynchronousIoFile

0000000C

7DE8F9E0

NtClose

00000038

7DE8FE2C

NtCloseObjectAuditAlarm

00000088

7DE905E8

NtCommitComplete

00000089

7DE90600

NtCommitEnlistment

0000008A

7DE90618

NtCommitTransaction

0000008B

7DE90630

NtCompactKeys

0000008C

7DE90648

NtCompareTokens

0000008D

7DE90660

NtCompleteConnectPort

0000008F

7DE90694

NtConnectPort

00000040

7DE8FEF0

NtContinue

00000090

7DE906AC

NtCreateDebugObject

00000091

7DE906C4

NtCreateDirectoryObject

00000092

7DE906DC

NtCreateEnlistment

00000045

7DE8FF74

NtCreateEvent

00000093

7DE906F4

NtCreateEventPair

00000052

7DE900B4

NtCreateFile

00000094

7DE9070C

NtCreateIoCompletion

00000095

7DE90724

NtCreateJobObject

00000096

7DE9073C

NtCreateJobSet

0000001A

7DE8FB40

NtCreateKey

00000097

7DE90754

NtCreateKeyTransacted

00000098

7DE9076C

NtCreateKeyedEvent

00000099

7DE90784

NtCreateMailslotFile

0000009A

7DE9079C

NtCreateMutant

0000009B

7DE907B4

NtCreateNamedPipeFile

0000009C

7DE907CC

NtCreatePagingFile

0000009D

7DE907E4

NtCreatePort

0000009E

7DE907FC

NtCreatePrivateNamespace

0000009F

7DE90814

NtCreateProcess

0000004A

7DE8FFEC

NtCreateProcessEx

000000A0

7DE9082C

NtCreateProfile

000000A1

7DE90844

NtCreateProfileEx

000000A2

7DE9085C

NtCreateResourceManager

00000047

7DE8FFA4

NtCreateSection

000000A3

7DE90874

NtCreateSemaphore

000000A4

7DE9088C

NtCreateSymbolicLinkObject

0000004B

7DE90004

NtCreateThread

000000A5

7DE908A4

NtCreateThreadEx

000000A6

7DE908BC

NtCreateTimer

000000A7

7DE908D4

NtCreateToken

000000A8

7DE908EC

NtCreateTransaction

000000A9

7DE90904

NtCreateTransactionManager

000000AA

7DE9091C

NtCreateUserProcess

000000AB

7DE90934

NtCreateWaitablePort

000000AC

7DE9094C

NtCreateWorkerFactory

000000AE

7DE90980

NtDebugContinue

000000B0

7DE909B4

NtDeleteBootEntry

000000B1

7DE909CC

NtDeleteDriverEntry

000000B2

7DE909E4

NtDeleteFile

000000B3

7DE909FC

NtDeleteKey

000000B4

7DE90A14

NtDeleteObjectAuditAlarm

000000B5

7DE90A2C

NtDeletePrivateNamespace

000000B6

7DE90A44

NtDeleteValueKey

000000B7

7DE90A5C

NtDisableLastKnownGood

000000B8

7DE90A74

NtDisplayString

000000B9

7DE90A8C

NtDrawText

00000039

7DE8FE44

NtDuplicateObject

0000003F

7DE8FED8

NtDuplicateToken

000000BA

7DE90AA4

NtEnableLastKnownGood

000000BB

7DE90ABC

NtEnumerateBootEntries

000000BC

7DE90AD4

NtEnumerateDriverEntries

0000002F

7DE8FD4C

NtEnumerateKey

000000BD

7DE90AEC

NtEnumerateSystemEnvironmentValuesEx

000000BE

7DE90B04

NtEnumerateTransactionObject

00000010

7DE8FA40

NtEnumerateValueKey

000000BF

7DE90B1C

NtExtendSection

000000C0

7DE90B34

NtFilterToken

00000048

7DE8FFBC

NtFlushBuffersFile

000000C1

7DE90B4C

NtFlushInstallUILanguage

000000C4

7DE90B9C

NtFlushProcessWriteBuffers

000000C5

7DE90BB4

NtFlushVirtualMemory

000000C7

7DE90BE8

NtFreeUserPhysicalPages

0000001B

7DE8FB58

NtFreeVirtualMemory

000000C8

7DE90C00

NtFreezeRegistry

000000C9

7DE90C18

NtFreezeTransactions

000000CA

7DE90C30

NtGetContextThread

000000CD

7DE90C80

NtGetMUIRegistryInfo

000000CE

7DE90C98

NtGetNextProcess

000000CF

7DE90CB0

NtGetNextThread

000000D0

7DE90CC8

NtGetNlsSectionPtr

000000D1

7DE90CE0

NtGetNotificationResourceManager

000000D2

7DE90CF8

NtGetPlugPlayEvent

000000D3

7DE90D10

NtGetWriteWatch

000000D5

7DE90D44

NtImpersonateThread

000000D6

7DE90D5C

NtInitializeNlsFiles

000000D7

7DE90D74

NtInitializeRegistry

000000DA

7DE90DC4

NtIsUILanguageComitted

000000DB

7DE90DDC

NtListenPort

000000DC

7DE90DF4

NtLoadDriver

000000DD

7DE90E0C

NtLoadKey

000000DE

7DE90E24

NtLoadKey2

000000DF

7DE90E3C

NtLoadKeyEx

000000E0

7DE90E54

NtLockFile

000000E3

7DE90EA4

NtLockVirtualMemory

000000E6

7DE90EF4

NtMapCMFModule

00000025

7DE8FC50

NtMapViewOfSection

000000E8

7DE90F28

NtModifyBootEntry

000000E9

7DE90F40

NtModifyDriverEntry

000000EA

7DE90F58

NtNotifyChangeDirectoryFile

000000EB

7DE90F70

NtNotifyChangeKey

000000EC

7DE90F88

NtNotifyChangeMultipleKeys

000000ED

7DE90FA0

NtNotifyChangeSession

00000055

7DE900FC

NtOpenDirectoryObject

000000EE

7DE90FB8

NtOpenEnlistment

0000003D

7DE8FEA8

NtOpenEvent

000000EF

7DE90FD0

NtOpenEventPair

00000030

7DE8FD64

NtOpenFile

000000F0

7DE90FE8

NtOpenIoCompletion

000000F1

7DE91000

NtOpenJobObject

0000000F

7DE8FA28

NtOpenKey

000000F2

7DE91018

NtOpenKeyEx

000000F3

7DE91030

NtOpenKeyTransacted

000000F4

7DE91048

NtOpenKeyTransactedEx

000000F5

7DE91060

NtOpenKeyedEvent

000000F6

7DE91078

NtOpenMutant

000000F7

7DE91090

NtOpenObjectAuditAlarm

000000F8

7DE910A8

NtOpenPrivateNamespace

00000023

7DE8FC20

NtOpenProcess

000000F9

7DE910C0

NtOpenProcessToken

0000002D

7DE8FD18

NtOpenProcessTokenEx

000000FA

7DE910D8

NtOpenResourceManager

00000034

7DE8FDC8

NtOpenSection

000000FB

7DE910F0

NtOpenSemaphore

000000FC

7DE91108

NtOpenSession

000000FD

7DE91120

NtOpenSymbolicLinkObject

000000FE

7DE91138

NtOpenThread

00000021

7DE8FBF0

NtOpenThreadToken

0000002C

7DE8FD00

NtOpenThreadTokenEx

000000FF

7DE91150

NtOpenTimer

00000100

7DE91168

NtOpenTransaction

00000101

7DE91180

NtOpenTransactionManager

00000102

7DE91198

NtPlugPlayControl

0000005C

7DE901AC

NtPowerInformation

00000103

7DE911B0

NtPrePrepareComplete

00000104

7DE911C8

NtPrePrepareEnlistment

00000105

7DE911E0

NtPrepareComplete

00000106

7DE911F8

NtPrepareEnlistment

00000108

7DE9122C

NtPrivilegeObjectAuditAlarm

00000109

7DE91244

NtPrivilegedServiceAuditAlarm

0000010A

7DE9125C

NtPropagationComplete

0000010B

7DE91274

NtPropagationFailed

0000004D

7DE90038

NtProtectVirtualMemory

0000003A

7DE8FE5C

NtQueryAttributesFile

0000010D

7DE912A8

NtQueryBootEntryOrder

0000010E

7DE912C0

NtQueryBootOptions

00000032

7DE8FD98

NtQueryDirectoryFile

00000110

7DE912F4

NtQueryDirectoryObject

00000111

7DE9130C

NtQueryDriverEntryOrder

00000112

7DE91324

NtQueryEaFile

00000053

7DE900CC

NtQueryEvent

00000113

7DE9133C

NtQueryFullAttributesFile

00000114

7DE91354

NtQueryInformationAtom

00000115

7DE9136C

NtQueryInformationEnlistment

0000000E

7DE8FA10

NtQueryInformationFile

00000116

7DE91384

NtQueryInformationJobObject

00000117

7DE9139C

NtQueryInformationPort

00000016

7DE8FAD8

NtQueryInformationProcess

00000118

7DE913B4

NtQueryInformationResourceManager

00000022

7DE8FC08

NtQueryInformationThread

0000001E

7DE8FBA8

NtQueryInformationToken

00000119

7DE913CC

NtQueryInformationTransaction

0000011A

7DE913E4

NtQueryInformationTransactionManager

0000011B

7DE913FC

NtQueryInformationWorkerFactory

0000011E

7DE9144C

NtQueryIoCompletion

00000013

7DE8FA90

NtQueryKey

0000011F

7DE91464

NtQueryLicenseValue

00000120

7DE9147C

NtQueryMultipleValueKey

00000121

7DE91494

NtQueryMutant

0000000D

7DE8F9F8

NtQueryObject

00000122

7DE914AC

NtQueryOpenSubKeys

00000123

7DE914C4

NtQueryOpenSubKeysEx

00000125

7DE914F8

NtQueryQuotaInformationFile

0000004E

7DE90050

NtQuerySection

00000126

7DE91510

NtQuerySecurityAttributesToken

00000127

7DE91528

NtQuerySecurityObject

00000128

7DE91540

NtQuerySemaphore

00000129

7DE91558

NtQuerySymbolicLinkObject

0000012A

7DE91570

NtQuerySystemEnvironmentValue

0000012B

7DE91588

NtQuerySystemEnvironmentValueEx

00000033

7DE8FDB0

NtQuerySystemInformation

0000012C

7DE915A0

NtQuerySystemInformationEx

00000035

7DE8FDE0

NtQueryTimer

00000014

7DE8FAA8

NtQueryValueKey

00000020

7DE8FBD8

NtQueryVirtualMemory

00000046

7DE8FF8C

NtQueryVolumeInformationFile

00000042

7DE8FF24

NtQueueApcThread

0000012E

7DE915D4

NtQueueApcThreadEx

0000012F

7DE915EC

NtRaiseException

00000130

7DE91604

NtRaiseHardError

00000131

7DE9161C

NtReadOnlyEnlistment

00000051

7DE9009C

NtReadRequestData

0000003C

7DE8FE90

NtReadVirtualMemory

00000132

7DE91634

NtRecoverEnlistment

00000133

7DE9164C

NtRecoverResourceManager

00000134

7DE91664

NtRecoverTransactionManager

00000135

7DE9167C

NtRegisterProtocolAddressInformation

00000138

7DE916CC

NtReleaseWorkerFactoryWorker

00000139

7DE916E4

NtRemoveIoCompletionEx

0000013B

7DE91718

NtRenameKey

0000013C

7DE91730

NtRenameTransactionManager

0000013D

7DE91748

NtReplaceKey

0000013E

7DE91760

NtReplacePartitionUnit

00000009

7DE8F994

NtReplyPort

00000008

7DE8F97C

NtReplyWaitReceivePort

00000028

7DE8FC98

NtReplyWaitReceivePortEx

0000013F

7DE91778

NtReplyWaitReplyPort

00000140

7DE91790

NtRequestPort

0000001F

7DE8FBC0

NtRequestWaitReplyPort

00000143

7DE917E0

NtRestoreKey

00000145

7DE91814

NtRollbackComplete

00000146

7DE9182C

NtRollbackEnlistment

00000147

7DE91844

NtRollbackTransaction

00000148

7DE9185C

NtRollforwardTransactionManager

00000149

7DE91874

NtSaveKey

0000014A

7DE9188C

NtSaveKeyEx

0000014C

7DE918C0

NtSecureConnectPort

0000014D

7DE918D8

NtSerializeBoot

0000014E

7DE918F0

NtSetBootEntryOrder

0000014F

7DE91908

NtSetBootOptions

00000150

7DE91920

NtSetContextThread

00000155

7DE919A8

NtSetDriverEntryOrder

00000156

7DE919C0

NtSetEaFile

00000159

7DE91A10

NtSetInformationDebugObject

0000015A

7DE91A28

NtSetInformationEnlistment

00000024

7DE8FC38

NtSetInformationFile

0000015B

7DE91A40

NtSetInformationJobObject

0000015C

7DE91A58

NtSetInformationKey

00000059

7DE90164

NtSetInformationObject

00000019

7DE8FB28

NtSetInformationProcess

0000015D

7DE91A70

NtSetInformationResourceManager

0000000A

7DE8F9AC

NtSetInformationThread

0000015E

7DE91A88

NtSetInformationToken

0000015F

7DE91AA0

NtSetInformationTransaction

00000160

7DE91AB8

NtSetInformationTransactionManager

00000161

7DE91AD0

NtSetInformationWorkerFactory

00000163

7DE91B04

NtSetIoCompletion

00000164

7DE91B1C

NtSetIoCompletionEx

00000165

7DE91B34

NtSetLdtEntries

00000168

7DE91B84

NtSetQuotaInformationFile

00000169

7DE91B9C

NtSetSecurityObject

0000016A

7DE91BB4

NtSetSystemEnvironmentValue

0000016B

7DE91BCC

NtSetSystemEnvironmentValueEx

0000016C

7DE91BE4

NtSetSystemInformation

0000016D

7DE91BFC

NtSetSystemPowerState

0000005F

7DE901F8

NtSetTimer

00000170

7DE91C4C

NtSetTimerEx

0000005D

7DE901C4

NtSetValueKey

00000173

7DE91C9C

NtSetVolumeInformationFile

00000175

7DE91CD0

NtShutdownWorkerFactory

00000177

7DE91D04

NtSinglePhaseReject

0000017C

7DE91D8C

NtSystemDebugControl

00000029

7DE8FCB0

NtTerminateProcess

00000050

7DE90084

NtTerminateThread

0000017F

7DE91DDC

NtThawRegistry

00000180

7DE91DF4

NtThawTransactions

00000181

7DE91E0C

NtTraceControl

0000005B

7DE90194

NtTraceEvent

00000183

7DE91E40

NtUmsThreadYield

00000184

7DE91E58

NtUnloadDriver

00000185

7DE91E70

NtUnloadKey

00000186

7DE91E88

NtUnloadKey2

00000187

7DE91EA0

NtUnloadKeyEx

00000188

7DE91EB8

NtUnlockFile

00000189

7DE91ED0

NtUnlockVirtualMemory

00000027

7DE8FC80

NtUnmapViewOfSection

0000018A

7DE91EE8

NtVdmControl

0000018B

7DE91F00

NtWaitForDebugEvent

0000018D

7DE91F34

NtWaitForWorkViaWorkerFactory

00000190

7DE91F84

NtWorkerFactoryWorkerReady

000001A3

7DE9214C

NtWow64CallFunction64

00000194

7DE91FE4

NtWow64CsrAllocateCaptureBuffer

00000196

7DE92014

NtWow64CsrAllocateMessagePointer

00000197

7DE9202C

NtWow64CsrCaptureMessageBuffer

00000198

7DE92044

NtWow64CsrCaptureMessageString

00000193

7DE91FCC

NtWow64CsrClientCallServer

00000191

7DE91F9C

NtWow64CsrClientConnectToServer

00000195

7DE91FFC

NtWow64CsrFreeCaptureBuffer

00000199

7DE9205C

NtWow64CsrGetProcessId

00000192

7DE91FB4

NtWow64CsrIdentifyAlertableThread

0000019A

7DE92074

NtWow64CsrVerifyRegion

0000019B

7DE9208C

NtWow64DebuggerCall

0000019C

7DE920A4

NtWow64GetCurrentProcessorNumberEx

0000019D

7DE920BC

NtWow64GetNativeSystemInformation

0000019E

7DE920D4

NtWow64InterlockedPopEntrySList

0000019F

7DE920EC

NtWow64QueryInformationProcess64

000001A2

7DE92134

NtWow64QueryVirtualMemory64

000001A0

7DE92104

NtWow64ReadVirtualMemory64

000001A1

7DE9211C

NtWow64WriteVirtualMemory64

00000054

7DE900E4

NtWriteRequestData

00000037

7DE8FE14

NtWriteVirtualMemory

0000019D

7DE920BC

RtlGetNativeSystemInformation

00000060

7DE90210

ZwAcceptConnectPort

00000061

7DE90228

ZwAccessCheck

00000026

7DE8FC68

ZwAccessCheckAndAuditAlarm

00000062

7DE90240

ZwAccessCheckByType

00000056

7DE90114

ZwAccessCheckByTypeAndAuditAlarm

00000063

7DE90258

ZwAccessCheckByTypeResultList

00000064

7DE90270

ZwAccessCheckByTypeResultListAndAuditAlarm

00000065

7DE90288

ZwAccessCheckByTypeResultListAndAuditAlarmByHandle

00000066

7DE902A0

ZwAddBootEntry

00000067

7DE902B8

ZwAddDriverEntry

00000068

7DE902D0

ZwAdjustGroupsToken

0000003E

7DE8FEC0

ZwAdjustPrivilegesToken

0000006C

7DE9033C

ZwAllocateReserveObject

0000006D

7DE90354

ZwAllocateUserPhysicalPages

00000015

7DE8FAC0

ZwAllocateVirtualMemory

0000006F

7DE90388

ZwAlpcAcceptConnectPort

00000070

7DE903A0

ZwAlpcCancelMessage

00000071

7DE903B8

ZwAlpcConnectPort

00000072

7DE903D0

ZwAlpcCreatePort

00000073

7DE903E8

ZwAlpcCreatePortSection

00000074

7DE90400

ZwAlpcCreateResourceReserve

00000075

7DE90418

ZwAlpcCreateSectionView

00000076

7DE90430

ZwAlpcCreateSecurityContext

00000077

7DE90448

ZwAlpcDeletePortSection

00000078

7DE90460

ZwAlpcDeleteResourceReserve

00000079

7DE90478

ZwAlpcDeleteSectionView

0000007A

7DE90490

ZwAlpcDeleteSecurityContext

0000007B

7DE904A8

ZwAlpcDisconnectPort

0000007C

7DE904C0

ZwAlpcImpersonateClientOfPort

0000007D

7DE904D8

ZwAlpcOpenSenderProcess

0000007E

7DE904F0

ZwAlpcOpenSenderThread

0000007F

7DE90508

ZwAlpcQueryInformation

00000080

7DE90520

ZwAlpcQueryInformationMessage

00000081

7DE90538

ZwAlpcRevokeSecurityContext

00000082

7DE90550

ZwAlpcSendWaitReceivePort

00000083

7DE90568

ZwAlpcSetInformation

00000049

7DE8FFD4

ZwApphelpCacheControl

00000002

7DE8F8D8

ZwCallbackReturn

0000005A

7DE9017C

ZwCancelIoFile

00000086

7DE905B8

ZwCancelIoFileEx

00000087

7DE905D0

ZwCancelSynchronousIoFile

0000000C

7DE8F9E0

ZwClose

00000038

7DE8FE2C

ZwCloseObjectAuditAlarm

00000088

7DE905E8

ZwCommitComplete

00000089

7DE90600

ZwCommitEnlistment

0000008A

7DE90618

ZwCommitTransaction

0000008B

7DE90630

ZwCompactKeys

0000008C

7DE90648

ZwCompareTokens

0000008D

7DE90660

ZwCompleteConnectPort

0000008F

7DE90694

ZwConnectPort

00000040

7DE8FEF0

ZwContinue

00000090

7DE906AC

ZwCreateDebugObject

00000091

7DE906C4

ZwCreateDirectoryObject

00000092

7DE906DC

ZwCreateEnlistment

00000045

7DE8FF74

ZwCreateEvent

00000093

7DE906F4

ZwCreateEventPair

00000052

7DE900B4

ZwCreateFile

00000094

7DE9070C

ZwCreateIoCompletion

00000095

7DE90724

ZwCreateJobObject

00000096

7DE9073C

ZwCreateJobSet

0000001A

7DE8FB40

ZwCreateKey

00000097

7DE90754

ZwCreateKeyTransacted

00000098

7DE9076C

ZwCreateKeyedEvent

00000099

7DE90784

ZwCreateMailslotFile

0000009A

7DE9079C

ZwCreateMutant

0000009B

7DE907B4

ZwCreateNamedPipeFile

0000009C

7DE907CC

ZwCreatePagingFile

0000009D

7DE907E4

ZwCreatePort

0000009E

7DE907FC

ZwCreatePrivateNamespace

0000009F

7DE90814

ZwCreateProcess

0000004A

7DE8FFEC

ZwCreateProcessEx

000000A0

7DE9082C

ZwCreateProfile

000000A1

7DE90844

ZwCreateProfileEx

000000A2

7DE9085C

ZwCreateResourceManager

00000047

7DE8FFA4

ZwCreateSection

000000A3

7DE90874

ZwCreateSemaphore

000000A4

7DE9088C

ZwCreateSymbolicLinkObject

0000004B

7DE90004

ZwCreateThread

000000A5

7DE908A4

ZwCreateThreadEx

000000A6

7DE908BC

ZwCreateTimer

000000A7

7DE908D4

ZwCreateToken

000000A8

7DE908EC

ZwCreateTransaction

000000A9

7DE90904

ZwCreateTransactionManager

000000AA

7DE9091C

ZwCreateUserProcess

000000AB

7DE90934

ZwCreateWaitablePort

000000AC

7DE9094C

ZwCreateWorkerFactory

000000AE

7DE90980

ZwDebugContinue

000000B0

7DE909B4

ZwDeleteBootEntry

000000B1

7DE909CC

ZwDeleteDriverEntry

000000B2

7DE909E4

ZwDeleteFile

000000B3

7DE909FC

ZwDeleteKey

000000B4

7DE90A14

ZwDeleteObjectAuditAlarm

000000B5

7DE90A2C

ZwDeletePrivateNamespace

000000B6

7DE90A44

ZwDeleteValueKey

000000B7

7DE90A5C

ZwDisableLastKnownGood

000000B8

7DE90A74

ZwDisplayString

000000B9

7DE90A8C

ZwDrawText

00000039

7DE8FE44

ZwDuplicateObject

0000003F

7DE8FED8

ZwDuplicateToken

000000BA

7DE90AA4

ZwEnableLastKnownGood

000000BB

7DE90ABC

ZwEnumerateBootEntries

000000BC

7DE90AD4

ZwEnumerateDriverEntries

0000002F

7DE8FD4C

ZwEnumerateKey

000000BD

7DE90AEC

ZwEnumerateSystemEnvironmentValuesEx

000000BE

7DE90B04

ZwEnumerateTransactionObject

00000010

7DE8FA40

ZwEnumerateValueKey

000000BF

7DE90B1C

ZwExtendSection

000000C0

7DE90B34

ZwFilterToken

00000048

7DE8FFBC

ZwFlushBuffersFile

000000C1

7DE90B4C

ZwFlushInstallUILanguage

000000C4

7DE90B9C

ZwFlushProcessWriteBuffers

000000C5

7DE90BB4

ZwFlushVirtualMemory

000000C7

7DE90BE8

ZwFreeUserPhysicalPages

0000001B

7DE8FB58

ZwFreeVirtualMemory

000000C8

7DE90C00

ZwFreezeRegistry

000000C9

7DE90C18

ZwFreezeTransactions

000000CA

7DE90C30

ZwGetContextThread

000000CD

7DE90C80

ZwGetMUIRegistryInfo

000000CE

7DE90C98

ZwGetNextProcess

000000CF

7DE90CB0

ZwGetNextThread

000000D0

7DE90CC8

ZwGetNlsSectionPtr

000000D1

7DE90CE0

ZwGetNotificationResourceManager

000000D2

7DE90CF8

ZwGetPlugPlayEvent

000000D3

7DE90D10

ZwGetWriteWatch

000000D5

7DE90D44

ZwImpersonateThread

000000D6

7DE90D5C

ZwInitializeNlsFiles

000000D7

7DE90D74

ZwInitializeRegistry

000000DA

7DE90DC4

ZwIsUILanguageComitted

000000DB

7DE90DDC

ZwListenPort

000000DC

7DE90DF4

ZwLoadDriver

000000DD

7DE90E0C

ZwLoadKey

000000DE

7DE90E24

ZwLoadKey2

000000DF

7DE90E3C

ZwLoadKeyEx

000000E0

7DE90E54

ZwLockFile

000000E3

7DE90EA4

ZwLockVirtualMemory

000000E6

7DE90EF4

ZwMapCMFModule

00000025

7DE8FC50

ZwMapViewOfSection

000000E8

7DE90F28

ZwModifyBootEntry

000000E9

7DE90F40

ZwModifyDriverEntry

000000EA

7DE90F58

ZwNotifyChangeDirectoryFile

000000EB

7DE90F70

ZwNotifyChangeKey

000000EC

7DE90F88

ZwNotifyChangeMultipleKeys

000000ED

7DE90FA0

ZwNotifyChangeSession

00000055

7DE900FC

ZwOpenDirectoryObject

000000EE

7DE90FB8

ZwOpenEnlistment

0000003D

7DE8FEA8

ZwOpenEvent

000000EF

7DE90FD0

ZwOpenEventPair

00000030

7DE8FD64

ZwOpenFile

000000F0

7DE90FE8

ZwOpenIoCompletion

000000F1

7DE91000

ZwOpenJobObject

0000000F

7DE8FA28

ZwOpenKey

000000F2

7DE91018

ZwOpenKeyEx

000000F3

7DE91030

ZwOpenKeyTransacted

000000F4

7DE91048

ZwOpenKeyTransactedEx

000000F5

7DE91060

ZwOpenKeyedEvent

000000F6

7DE91078

ZwOpenMutant

000000F7

7DE91090

ZwOpenObjectAuditAlarm

000000F8

7DE910A8

ZwOpenPrivateNamespace

00000023

7DE8FC20

ZwOpenProcess

000000F9

7DE910C0

ZwOpenProcessToken

0000002D

7DE8FD18

ZwOpenProcessTokenEx

000000FA

7DE910D8

ZwOpenResourceManager

00000034

7DE8FDC8

ZwOpenSection

000000FB

7DE910F0

ZwOpenSemaphore

000000FC

7DE91108

ZwOpenSession

000000FD

7DE91120

ZwOpenSymbolicLinkObject

000000FE

7DE91138

ZwOpenThread

00000021

7DE8FBF0

ZwOpenThreadToken

0000002C

7DE8FD00

ZwOpenThreadTokenEx

000000FF

7DE91150

ZwOpenTimer

00000100

7DE91168

ZwOpenTransaction

00000101

7DE91180

ZwOpenTransactionManager

00000102

7DE91198

ZwPlugPlayControl

0000005C

7DE901AC

ZwPowerInformation

00000103

7DE911B0

ZwPrePrepareComplete

00000104

7DE911C8

ZwPrePrepareEnlistment

00000105

7DE911E0

ZwPrepareComplete

00000106

7DE911F8

ZwPrepareEnlistment

00000108

7DE9122C

ZwPrivilegeObjectAuditAlarm

00000109

7DE91244

ZwPrivilegedServiceAuditAlarm

0000010A

7DE9125C

ZwPropagationComplete

0000010B

7DE91274

ZwPropagationFailed

0000004D

7DE90038

ZwProtectVirtualMemory

0000003A

7DE8FE5C

ZwQueryAttributesFile

0000010D

7DE912A8

ZwQueryBootEntryOrder

0000010E

7DE912C0

ZwQueryBootOptions

00000032

7DE8FD98

ZwQueryDirectoryFile

00000110

7DE912F4

ZwQueryDirectoryObject

00000111

7DE9130C

ZwQueryDriverEntryOrder

00000112

7DE91324

ZwQueryEaFile

00000053

7DE900CC

ZwQueryEvent

00000113

7DE9133C

ZwQueryFullAttributesFile

00000114

7DE91354

ZwQueryInformationAtom

00000115

7DE9136C

ZwQueryInformationEnlistment

0000000E

7DE8FA10

ZwQueryInformationFile

00000116

7DE91384

ZwQueryInformationJobObject

00000117

7DE9139C

ZwQueryInformationPort

00000016

7DE8FAD8

ZwQueryInformationProcess

00000118

7DE913B4

ZwQueryInformationResourceManager

00000022

7DE8FC08

ZwQueryInformationThread

0000001E

7DE8FBA8

ZwQueryInformationToken

00000119

7DE913CC

ZwQueryInformationTransaction

0000011A

7DE913E4

ZwQueryInformationTransactionManager

0000011B

7DE913FC

ZwQueryInformationWorkerFactory

0000011E

7DE9144C

ZwQueryIoCompletion

00000013

7DE8FA90

ZwQueryKey

0000011F

7DE91464

ZwQueryLicenseValue

00000120

7DE9147C

ZwQueryMultipleValueKey

00000121

7DE91494

ZwQueryMutant

0000000D

7DE8F9F8

ZwQueryObject

00000122

7DE914AC

ZwQueryOpenSubKeys

00000123

7DE914C4

ZwQueryOpenSubKeysEx

00000125

7DE914F8

ZwQueryQuotaInformationFile

0000004E

7DE90050

ZwQuerySection

00000126

7DE91510

ZwQuerySecurityAttributesToken

00000127

7DE91528

ZwQuerySecurityObject

00000128

7DE91540

ZwQuerySemaphore

00000129

7DE91558

ZwQuerySymbolicLinkObject

0000012A

7DE91570

ZwQuerySystemEnvironmentValue

0000012B

7DE91588

ZwQuerySystemEnvironmentValueEx

00000033

7DE8FDB0

ZwQuerySystemInformation

0000012C

7DE915A0

ZwQuerySystemInformationEx

00000035

7DE8FDE0

ZwQueryTimer

00000014

7DE8FAA8

ZwQueryValueKey

00000020

7DE8FBD8

ZwQueryVirtualMemory

00000046

7DE8FF8C

ZwQueryVolumeInformationFile

00000042

7DE8FF24

ZwQueueApcThread

0000012E

7DE915D4

ZwQueueApcThreadEx

0000012F

7DE915EC

ZwRaiseException

00000130

7DE91604

ZwRaiseHardError

00000131

7DE9161C

ZwReadOnlyEnlistment

00000051

7DE9009C

ZwReadRequestData

0000003C

7DE8FE90

ZwReadVirtualMemory

00000132

7DE91634

ZwRecoverEnlistment

00000133

7DE9164C

ZwRecoverResourceManager

00000134

7DE91664

ZwRecoverTransactionManager

00000135

7DE9167C

ZwRegisterProtocolAddressInformation

00000138

7DE916CC

ZwReleaseWorkerFactoryWorker

00000139

7DE916E4

ZwRemoveIoCompletionEx

0000013B

7DE91718

ZwRenameKey

0000013C

7DE91730

ZwRenameTransactionManager

0000013D

7DE91748

ZwReplaceKey

0000013E

7DE91760

ZwReplacePartitionUnit

00000009

7DE8F994

ZwReplyPort

00000008

7DE8F97C

ZwReplyWaitReceivePort

00000028

7DE8FC98

ZwReplyWaitReceivePortEx

0000013F

7DE91778

ZwReplyWaitReplyPort

00000140

7DE91790

ZwRequestPort

0000001F

7DE8FBC0

ZwRequestWaitReplyPort

00000143

7DE917E0

ZwRestoreKey

00000145

7DE91814

ZwRollbackComplete

00000146

7DE9182C

ZwRollbackEnlistment

00000147

7DE91844

ZwRollbackTransaction

00000148

7DE9185C

ZwRollforwardTransactionManager

00000149

7DE91874

ZwSaveKey

0000014A

7DE9188C

ZwSaveKeyEx

0000014C

7DE918C0

ZwSecureConnectPort

0000014D

7DE918D8

ZwSerializeBoot

0000014E

7DE918F0

ZwSetBootEntryOrder

0000014F

7DE91908

ZwSetBootOptions

00000150

7DE91920

ZwSetContextThread

00000155

7DE919A8

ZwSetDriverEntryOrder

00000156

7DE919C0

ZwSetEaFile

00000159

7DE91A10

ZwSetInformationDebugObject

0000015A

7DE91A28

ZwSetInformationEnlistment

00000024

7DE8FC38

ZwSetInformationFile

0000015B

7DE91A40

ZwSetInformationJobObject

0000015C

7DE91A58

ZwSetInformationKey

00000059

7DE90164

ZwSetInformationObject

00000019

7DE8FB28

ZwSetInformationProcess

0000015D

7DE91A70

ZwSetInformationResourceManager

0000000A

7DE8F9AC

ZwSetInformationThread

0000015E

7DE91A88

ZwSetInformationToken

0000015F

7DE91AA0

ZwSetInformationTransaction

00000160

7DE91AB8

ZwSetInformationTransactionManager

00000161

7DE91AD0

ZwSetInformationWorkerFactory

00000163

7DE91B04

ZwSetIoCompletion

00000164

7DE91B1C

ZwSetIoCompletionEx

00000165

7DE91B34

ZwSetLdtEntries

00000168

7DE91B84

ZwSetQuotaInformationFile

00000169

7DE91B9C

ZwSetSecurityObject

0000016A

7DE91BB4

ZwSetSystemEnvironmentValue

0000016B

7DE91BCC

ZwSetSystemEnvironmentValueEx

0000016C

7DE91BE4

ZwSetSystemInformation

0000016D

7DE91BFC

ZwSetSystemPowerState

0000005F

7DE901F8

ZwSetTimer

00000170

7DE91C4C

ZwSetTimerEx

0000005D

7DE901C4

ZwSetValueKey

00000173

7DE91C9C

ZwSetVolumeInformationFile

00000175

7DE91CD0

ZwShutdownWorkerFactory

00000177

7DE91D04

ZwSinglePhaseReject

0000017C

7DE91D8C

ZwSystemDebugControl

00000029

7DE8FCB0

ZwTerminateProcess

00000050

7DE90084

ZwTerminateThread

0000017F

7DE91DDC

ZwThawRegistry

00000180

7DE91DF4

ZwThawTransactions

00000181

7DE91E0C

ZwTraceControl

0000005B

7DE90194

ZwTraceEvent

00000183

7DE91E40

ZwUmsThreadYield

00000184

7DE91E58

ZwUnloadDriver

00000185

7DE91E70

ZwUnloadKey

00000186

7DE91E88

ZwUnloadKey2

00000187

7DE91EA0

ZwUnloadKeyEx

00000188

7DE91EB8

ZwUnlockFile

00000189

7DE91ED0

ZwUnlockVirtualMemory

00000027

7DE8FC80

ZwUnmapViewOfSection

0000018A

7DE91EE8

ZwVdmControl

0000018B

7DE91F00

ZwWaitForDebugEvent

0000018D

7DE91F34

ZwWaitForWorkViaWorkerFactory

00000190

7DE91F84

ZwWorkerFactoryWorkerReady

000001A3

7DE9214C

ZwWow64CallFunction64

00000194

7DE91FE4

ZwWow64CsrAllocateCaptureBuffer

00000196

7DE92014

ZwWow64CsrAllocateMessagePointer

00000197

7DE9202C

ZwWow64CsrCaptureMessageBuffer

00000198

7DE92044

ZwWow64CsrCaptureMessageString

00000193

7DE91FCC

ZwWow64CsrClientCallServer

00000191

7DE91F9C

ZwWow64CsrClientConnectToServer

00000195

7DE91FFC

ZwWow64CsrFreeCaptureBuffer

00000199

7DE9205C

ZwWow64CsrGetProcessId

00000192

7DE91FB4

ZwWow64CsrIdentifyAlertableThread

0000019A

7DE92074

ZwWow64CsrVerifyRegion

0000019B

7DE9208C

ZwWow64DebuggerCall

0000019C

7DE920A4

ZwWow64GetCurrentProcessorNumberEx

0000019D

7DE920BC

ZwWow64GetNativeSystemInformation

0000019E

7DE920D4

ZwWow64InterlockedPopEntrySList

0000019F

7DE920EC

ZwWow64QueryInformationProcess64

000001A2

7DE92134

ZwWow64QueryVirtualMemory64

000001A0

7DE92104

ZwWow64ReadVirtualMemory64

000001A1

7DE9211C

ZwWow64WriteVirtualMemory64

00000054

7DE900E4

ZwWriteRequestData

00000037

7DE8FE14

ZwWriteVirtualMemory

Enjoy :)

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF