UAC(User Account Control,用户帐户控制)是微软公司为了提高Windows系统安全性而在 Windows Vista 中引入的一种新型安全技术,它要求用户在执行某些可能会影响计算机运行的操作或更改其他用户设置的操作之前,向系统申请权限或提供管理员密码。通过在这些操作启动前对其进行验证,UAC 可以帮助防止恶意软件和间谍软件在未经许可的情况下在计算机上进行安装或对计算机进行更改。
用户账户
Windows 中有多种不同的账户,包括:
完整性级别 表示正在运行的应用程序进程和对象的可信度。它使文件系统能够使用预定义的策略来阻止较低完整性级别的进程读取或修改较高完整性的对象。从 Windows Vista 开始,进程在创建的时候,可以得到一个访问令牌(Access Token),令牌有四个完整性级别:
对应关系如下:
System 令牌是对系统完全操作的令牌,对应 SYSTEM,拥有的最高权限。提升的应用程序以 High 完整性级别运行,普通进程以 Medium 完整性级别运行,低权限进程以 Low 完整性级别运行
在 Administrators 组中,Administrator 账户和普通管理员账户要分开说。普通管理员账户下,正常启动进程使用的是继承自 explorer.exe 的 Medium 访问令牌,当进程需要提升权限时,会弹出 UAC 提示框来启动一个子进程以获得 High 令牌。而 Administrator 账户下,正常启动的进程也都获得了 High 令牌
Users 组的用户没有 High 和 System 令牌,如果要权限提升,需要输入管理员账号密码,而这时拿到的是这个管理员账号的 High 令牌
例:直接运行 CMD 和以管理员权限运行 CMD 的进程完整性级别分别为 Medium 和 High。
更多资料:
https://blog.walterlv.com/post/windows-user-account-control.html
https://blog.walterlv.com/post/requested-execution-level-of-application-manifest
那进程如何获得 High 令牌呢?UAC 提示流程又是什么样子的?
AIS 服务:处理提升请求
当出现提升程序的请求时,AIS (appinfo.dll) 将进行校验程序是否满足提升的条件,主要看一下 AiIsEXESafeToAutoApprove 函数。以下 2 种情况可能不需要弹 UAC 对话框自动提升至管理员权限:
1、程序配置为自动提升
如果程序中配置了 autoElevate 为 true,会尝试自动提升
2、白名单
判断要执行的程序是否属于白名单,在白名单之内就调用 AipIsValidAutoApprovalEXE 函数检查程序签名 等信息,如果不在就基本结束这个函数了
白名单列表:
'cttunesvr.exe'、'inetmgr.exe'、'migsetup.exe'、'mmc.exe'、'oobe.exe'、'pkgmgr.exe'、'provisionshare.exe'、'provisionstorage.exe'、'spinstall .exe','winsat.exe'
满足这两个条件的情况可能会直接提升,先看看配置了 autoElevate 的程序。
这里有个熟悉的程序:任务管理器(Taskmgr.exe),以 High 级别运行,仔细回忆一下,启动任务管理器的过程中并没有出现 UAC 弹窗:
manifest (清单)是伴随并描述并行程序集或独立应用程序的 XML 文件。清单通过程序集的 assemblyIdentity 元素唯一标识程序集。它们包含用于绑定和激活的信息,例如 COM 类、接口和类型库,这些信息传统上存储在注册表中。以下为使用命令 mt -inputresource:Taskmgr.exe;#1 -out:taskmgr.manifest 从 Taskmgr.exe 中提取出的 manifest 文件:
但如果将 Taskmgr.exe 复制到桌面,直接运行该程序,就会发现还是会出现 UAC 弹窗。这又引出自动提升程序需要满足的一个关键条件:从受信任目录执行 。无论是 manifest 文件中设置了 autoElevate true,还是白名单列表判断,都需要 v13 的第 0x16 个比特位(index 从 0 开始计算)为 1 才行,这是一个前置条件。
v13 中的值从 a4 中取到,我们可以看一下它(AiIsEXESafeToAutoApprove)的上层函数 RAiLaunchAdminProcess,在下面的逻辑里会将目标程序字符串和 g_IncludedSysDir 进行比较,利用 RtlPrefixUnicodeString 和 wcschr 函数来判断目标程序是否在 \??\C:\Windows\System32\ 或 \??\C:\Windows\SysWow64\ 目录下,这两个目录是受信任的目录,如果满足条件,才会设置 flag 的第 0x16 个比特位(0x200000)。
不过还有两种特殊情况,是 g_IncludedXmtExe 中存储的 \??\C:\Windows\System32\Sysprep\sysprep.exe 以及 \??\C:\Windows\System32\inetsrv\InetMgr.exe,如果是这两个路径下的程序,且通过 AipMatchesOriginalFileName 函数检查(通过比较文件版本信息里的 OriginalFilename 来判断程序名字是否更改过),即使它们不是直接位于 System32 或 SysWow64 目录下,也会跳转到 LABEL_364 标签,设置 flag 的第 0x16 个比特位。
文件版本信息(以 sysprep.exe 为例):
处理示例:https://docs.microsoft.com/en-us/windows/win32/api/winver/nf-winver-verqueryvaluea
按照目前的逻辑,我们的程序从受信任目录执行 ,且配置了 autoElevate 为 true,就可以进入第一种流程。先编写一个简单的程序,比如弹个 CMD,使用 VS 编译程序的时候加入 manifest,指定 requireAdministrator 级别,表示需要获得权限提升,如下:
使用命令 mt -inputresource:test.exe;#1 -out:test.manifest 从 Taskmgr.exe 中提取 manifest 文件,加入 autoElevate 后使用:
加入 manifest:mt.exe -manifest test.manifest -outputresource:test.exe;1,好的,果然失败了:
虽然程序在 AiIsEXESafeToAutoApprove 函数校验中通过了,但在后续传递给 consent.exe 程序进行处理的过程中出现了问题,还是需要再分析一下~ 下次一定
——————————————— 分界线 ———————————————
下面开始介绍成熟的 Bypass 技巧
一、通过注册表劫持 Bypass UAC
参考:https://medium.themayor.tech/utilizing-a-common-windows-binary-to-escalate-to-system-privileges-c16482cced4b
目标程序:Fodhelper
注册表键值:HKCU\Software\Classes\ms-settings\shell\open\command
利用思路:添加注册表键值 HKCU\Software\Classes\ms-settings\shell\open\command,设置其 value 为需要执行的程序路径或命令;添加 HKCU:\Software\Classes\ms-settings\shell\open\command\DelegateExecute(修改 HKCU 下的键值只需要普通用户权限)。这样程序启动后会执行 HKCU\Software\Classes\ms-settings\shell\open\command 中的内容,从而绕过 UAC 弹窗
简单分析:
可以发现,fodhelper.exe 在 manifest 中配置了 autoElevate 为 True,并且运行之后没有弹窗。
使用 ProcessMonitor 监控,发现程序确实去访问 HKCU\Software\Classes\ms-settings\shell\open\command,不过默认情况下这个键值是不存在的,仔细看前面记录会发现 HKCU\Software\Classes\ms-settings 也是不存在的。
先创建 HKCU\Software\Classes\ms-settings\shell\open\command 项:
然后再次监控 fodhelper 运行,如果存在 HKCU\Software\Classes\ms-settings\shell\open\command,还会去查询 HKCU:\Software\Classes\ms-settings\shell\open\command\DelegateExecute
同样,再创建 HKCU\Software\Classes\ms-settings\shell\open\command\DelegateExecute 试一下:
可以发现,程序在成功查询到 HKCU\Software\Classes\ms-settings\shell\open\command\DelegateExecute 后会去查询 HKCU\Software\Classes\ms-settings\shell\open\command\command 或 HKCU\Software\Classes\ms-settings\shell\open\command\(Default),事实证明它们是一样的
这里我们来设置 HKCU\Software\Classes\ms-settings\shell\open\command\command 吧,将其设置为 cmd.exe。嗯。。。Defender 会检测到,但可以写入注册表,虽然过一会儿就被删了
不过,利用这段时间启动 fodhelper 还是可以成功的 ~
如果设置的 HKCU\Software\Classes\ms-settings\shell\open\command 中不包含敏感字符,Defender 就不会检测到,不会弹出提示,也不会删除键值:
如果有时间,还可以看一下其他程序有没有类似问题 ~
C 代码:
二、通过 DLL 劫持 Bypass UAC
参考:https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e
目标程序:winSAT.exe
DLL:winmm.dll
利用思路:使用 CreateDirectory API 创建 "C:\Windows \System32" 目录("Windows" 后面有空格)绕过 Appinfo.dll (AIS) 中 RtlPrefixUnicodeString 函数中的可信目录的检查。将目标程序复制到此目录,伪造 DLL,利用 DLL 加载顺序使目标程序加载伪造的 DLL 执行任意代码,从而绕过 UAC 弹窗提示
简单分析:
先看一下 DLL 加载顺序:
下面是个简单的例子,TestLoad 加载 onlytest.dll,程序加载目录是 C:\Users\strawberry,可以发现程序在加载 DLL 的时候会从程序所在目录开始寻找,然后才会从系统目录中搜索:
AIS 要求程序从可信目录中启动,而这些目录普通用户是没办法写入的。但是可以新建 "C:\Windows \System32" 目录,将白名单程序复制到这个目录,这样劫持 DLL 就顺理成章了。
winSAT.exe 导入了 winmm.dll 中两个函数 timeBeginPeriod、timeEndPeriod,伪造的 dll 也要导出这两个函数
以下为 dll 实现,偷懒这里直接用 mshta 了(需要关掉 defender)
然后运行 winsat,然后就成功了。不过,运行的时候有个弹窗,可以通过编程隐藏窗口~
以下为最终代码,原本的版本中创建目录时使用的是 \\?\C:\Windows \System32,但经测试,直接用 C:\Windows \System32 也是可以成功的。通过 se.nShow = SW_HIDE 使程序运行时隐藏弹窗。
另外,前面分析过 RAiLaunchAdminProcess 函数在验证要启动的程序是否位于可信路径时会使用 String2 与一些路径进行比对。以下为 String2 的赋值流程,"C:\Windows \System32\winSAT.exe" 经过 GetLongPathNameW 函数处理之后得到 "C:\Windows\System32\winSAT.exe",经过这个函数调用,"Windows " 中的空格被处理掉了,然后再调用 RtlDosPathNameToRelativeNtPathName_U_WithStatus 函数将字符串保存为以 "\??\" 开头的 UNICODE_STRING 类型的 String2。这样在后面比对的时候就可以匹配上 "C:\Windows\System32",从而校验通过,然后就调用 RtlFreeUnicodeString 函数把它释放了。
后面在调用 AiIsEXESafeToAutoApprove 函数时,传入的参数还是 "C:\Windows \System32\winSAT.exe",good ~
三、通过 APPINFO RPC服务 Bypass UAC
参考:https://googleprojectzero.blogspot.com/2019/12/calling-local-windows-rpc-servers-from.html
目标服务:AppInfo
相关函数:RAiLaunchAdminProcess
前置知识:如果可以在提升的 UAC 进程上启用调试并获得其调试对象的句柄,我们可以请求第一个调试事件,该事件将返回对该进程的完全访问句柄:https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html
利用思路:对于提升的进程,我们无法直接获得其调试对象句柄。但由于调试对象的句柄存储在 TEB 的保留字段中,同一个线程上创建的带有调试标志的所有进程共享同一个调试对象,可通过先创建 DEBUG_PROCESS 标志的非提升的进程,获得初始化的调试对象句柄,然后创建 DEBUG_PROCESS 标志的提升的进程,进而使用共用的调试对象句柄获得提升的进程的完全访问句柄
先按照文章上的步骤复现一下:
如下:
在这个过程中遇到过模块无法加载的问题,解决:(以管理员身份打开PowerShell 输入 set-executionpolicy remotesigned ,就当是先测试下吧,实际情况下还是会用 C 或 C# 程序)。参考:https://www.jianshu.com/p/4eaad2163567
简单分析
首先回顾一下 RAiLaunchAdminProcess 函数,该函数原型如下:
经过分析可以知道,该函数通过 AiCheckLUA -> AiLaunchConsentUI -> AiLaunchProcess -> CreateProcessAsUserW 函数调用链来启动 consent.exe 进程来判断是否需要弹窗,然后通过 AiLaunchProcess -> CreateProcessAsUserW 函数调用链启动目标程序。以下为 AiLaunchProcess 函数调用 CreateProcessAsUserW 函数的过程,其中 a7 来自 AiLaunchProcess 函数的第 7 个参数:
经过回溯发现该参数来自于 RAiLaunchAdminProcess 函数的第 6 个参数 a6,由于 RAiLaunchAdminProcess 函数采用异步处理,其第一个参数对应了 PRPC_ASYNC_STATE 类型的 pAsync,因而 a6 对应的参数是 CreateFlags
在调用 CreateProcessAsUserW 函数的时候会传入CreateFlags | 0x80004,CreateFlags 对应的 flag 列表可参考:https://docs.microsoft.com/en-us/windows/win32/procthread/process-creation-flags ,其中,设置 DEBUG_PROCESS 标志允许启动并调试新进程。
访问进程的调试对象句柄需要对进程句柄具有 PROCESS_QUERY_INFORMATION 访问权限,但如果是提升的进程,我们只能获得对该进程句柄的 PROCESS_QUERY_LIMITED_INFORMATION 访问权限。这种限制使我们不能简单地获取提升进程的调试对象句柄。
不过由于设置了 DEBUG_PROCESS 标志,在调用CreateProcessAsUserW 函数过程中会调用 ntdll!DbgUiConnectToDbg 函数,该函数从 TEB 中获取调试对象,如下所示:
DbgUiConnectToDbg 函数首先会判断 TEB 偏移 0x16A8 处是不是 0(+0x16a0 DbgSsReserved : [2] (null)),如果是的话,就调用 NtCreateDebugObject 函数来创建一个调试对象,相当于初始化当前线程的调试对象。如果这个线程再调试一个进程,就可以直接从 TEB 偏移 0x16A8 处获得
如果我们先创建一个普通进程并启用调试,在获得其调试句柄后分离调试器并终止进程,然后再创建一个调试的提升的进程,这样我们就有了获得提升进程的调试对象句柄的这个前提。然后就可以调用 WaitForDebugEvent 函数等待目标调试事件从而获得提升的进程句柄(NtWaitForDebugEvent 函数调用 DbgkpOpenHandles 处理 CREATE_PROCESS_DEBUG_EVENT 类型事件时,会初始化 CREATE_PROCESS_DEBUG_INFO 结构中的进程句柄),虽然获得了这个句柄,但我们缺少 PROCESS_SUSPEND_RESUME 权限,这会阻止我们将进程与调试对象分离。但由于我们具有 PROCESS_DUP_HANDLE 权限,因而可以调用 NtDuplicateObject 函数复制句柄从而获得完全提升的权限:
小结 验证某个结论往往是简单的,能自己寻找到那个点是困难且有意义的,此时发出一声哀叹,哎~ 太难了。新手上路,希望大佬们多带带菜鸡 T_T
参考链接:
https://blog.csdn.net/WPwalter/article/details/89838881
https://blog.walterlv.com/post/windows-user-account-control.html
https://blog.walterlv.com/post/requested-execution-level-of-application-manifest
https://medium.themayor.tech/utilizing-a-common-windows-binary-to-escalate-to-system-privileges-c16482cced4b
https://idiotc4t.com/privilege-escalation/bypassuac-fodhelper
https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e
https://googleprojectzero.blogspot.com/2019/12/calling-local-windows-rpc-servers-from.html
https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html
http://blog.nsfocus.net/appinfo-rpc-uac-bypass/
strings.exe
-
s
*
.exe | findstr
/
i
"autoElevate"
/
/
应该不全
C:\Windows\System32\BitLockerWizardElev.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\bthudtask.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\changepk.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\cleanmgr.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\ComputerDefaults.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\dccw.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\dcomcnfg.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\DeviceEject.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\DeviceProperties.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\dfrgui.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\djoin.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\easinvoker.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\EASPolicyManagerBrokerHost.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\eudcedit.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\eventvwr.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\fodhelper.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\fsavailux.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\fsquirt.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\FXSUNATD.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\immersivetpmvscmgrsvr.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\iscsicli.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\iscsicpl.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\lpksetup.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\MdSched.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\MSchedExe.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\msconfig.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\msdt.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\msra.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\MultiDigiMon.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\Netplwiz.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\newdev.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\odbcad32.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\OptionalFeatures.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\PasswordOnWakeSettingFlyout.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\perfmon.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\printui.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\rdpshell.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\recdisc.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\rrinstaller.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\rstrui.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\sdclt.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\shrpubw.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\slui.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SndVol.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesAdvanced.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesComputerName.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesDataExecutionPrevention.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesHardware.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesPerformance.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesProtection.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesRemote.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\systemreset.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\SystemSettingsAdminFlows.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemSettingsRemoveDevice.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\Taskmgr.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\tcmsetup.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\TpmInit.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\WindowsUpdateElevatedInstaller.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\WSReset.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\wusa.exe: <autoElevate>true<
/
autoElevate>
strings.exe
-
s
*
.exe | findstr
/
i
"autoElevate"
/
/
应该不全
C:\Windows\System32\BitLockerWizardElev.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\bthudtask.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\changepk.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\cleanmgr.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\ComputerDefaults.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\dccw.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\dcomcnfg.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\DeviceEject.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\DeviceProperties.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\dfrgui.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\djoin.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\easinvoker.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\EASPolicyManagerBrokerHost.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\eudcedit.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\eventvwr.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\fodhelper.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\fsavailux.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\fsquirt.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\FXSUNATD.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\immersivetpmvscmgrsvr.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\iscsicli.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\iscsicpl.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\lpksetup.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\MdSched.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\MSchedExe.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\msconfig.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\msdt.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\msra.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\MultiDigiMon.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\Netplwiz.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\newdev.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\odbcad32.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\OptionalFeatures.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\PasswordOnWakeSettingFlyout.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\perfmon.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\printui.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\rdpshell.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\recdisc.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\rrinstaller.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\rstrui.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\sdclt.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\shrpubw.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\slui.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SndVol.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesAdvanced.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesComputerName.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesDataExecutionPrevention.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesHardware.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesPerformance.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesProtection.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemPropertiesRemote.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\systemreset.exe: <autoElevate xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>true<
/
autoElevate>
C:\Windows\System32\SystemSettingsAdminFlows.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\SystemSettingsRemoveDevice.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\Taskmgr.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\tcmsetup.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\TpmInit.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\WindowsUpdateElevatedInstaller.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\WSReset.exe: <autoElevate>true<
/
autoElevate>
C:\Windows\System32\wusa.exe: <autoElevate>true<
/
autoElevate>
<?xml version
=
"1.0"
encoding
=
"UTF-8"
standalone
=
"yes"
?>
<assembly xmlns
=
"urn:schemas-microsoft-com:asm.v1"
xmlns:asmv3
=
"urn:schemas-microsoft-com:asm.v3"
manifestVersion
=
"1.0"
>
<assemblyIdentity processorArchitecture
=
"amd64"
version
=
"5.1.0.0"
name
=
"Microsoft.Windows.Diagnosis.AdvancedTaskManager"
type
=
"win32"
><
/
assemblyIdentity>
<description>Task Manager<
/
description>
<dependency>
<dependentAssembly>
<assemblyIdentity
type
=
"win32"
name
=
"Microsoft.Windows.Common-Controls"
version
=
"6.0.0.0"
processorArchitecture
=
"amd64"
publicKeyToken
=
"6595b64144ccf1df"
language
=
"*"
><
/
assemblyIdentity>
<
/
dependentAssembly>
<
/
dependency>
<trustInfo xmlns
=
"urn:schemas-microsoft-com:asm.v3"
>
<security>
<requestedPrivileges>
<requestedExecutionLevel level
=
"highestAvailable"
><
/
requestedExecutionLevel>
<
/
requestedPrivileges>
<
/
security>
<
/
trustInfo>
<asmv3:application>
<asmv3:windowsSettings xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>
<dpiAware>true<
/
dpiAware>
<autoElevate>true<
/
autoElevate>
<
/
asmv3:windowsSettings>
<
/
asmv3:application>
<
/
assembly>
<?xml version
=
"1.0"
encoding
=
"UTF-8"
standalone
=
"yes"
?>
<assembly xmlns
=
"urn:schemas-microsoft-com:asm.v1"
xmlns:asmv3
=
"urn:schemas-microsoft-com:asm.v3"
manifestVersion
=
"1.0"
>
<assemblyIdentity processorArchitecture
=
"amd64"
version
=
"5.1.0.0"
name
=
"Microsoft.Windows.Diagnosis.AdvancedTaskManager"
type
=
"win32"
><
/
assemblyIdentity>
<description>Task Manager<
/
description>
<dependency>
<dependentAssembly>
<assemblyIdentity
type
=
"win32"
name
=
"Microsoft.Windows.Common-Controls"
version
=
"6.0.0.0"
processorArchitecture
=
"amd64"
publicKeyToken
=
"6595b64144ccf1df"
language
=
"*"
><
/
assemblyIdentity>
<
/
dependentAssembly>
<
/
dependency>
<trustInfo xmlns
=
"urn:schemas-microsoft-com:asm.v3"
>
<security>
<requestedPrivileges>
<requestedExecutionLevel level
=
"highestAvailable"
><
/
requestedExecutionLevel>
<
/
requestedPrivileges>
<
/
security>
<
/
trustInfo>
<asmv3:application>
<asmv3:windowsSettings xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>
<dpiAware>true<
/
dpiAware>
<autoElevate>true<
/
autoElevate>
<
/
asmv3:windowsSettings>
<
/
asmv3:application>
<
/
assembly>
0
:
023
> db
01e2
`
85b73730
l72c
/
/
O.r.i.g.i.
000001e2
`
85b73730
94
03
34
00
00
00
56
00
-
53
00
5f
00
56
00
45
00
..
4.
..V.S._.V.E.
000001e2
`
85b73740
52
00
53
00
49
00
4f
00
-
4e
00
5f
00
49
00
4e
00
R.S.I.O.N._.I.N.
000001e2
`
85b73750
46
00
4f
00
00
00
00
00
-
bd
04
ef fe
00
00
01
00
F.O.............
000001e2
`
85b73760
00
00
0a
00
ea
02
61
4a
-
00
00
0a
00
ea
02
61
4a
......aJ......aJ
000001e2
`
85b73770
3f
00
00
00
00
00
00
00
-
04
00
04
00
01
00
00
00
?...............
000001e2
`
85b73780
00
00
00
00
00
00
00
00
-
00
00
00
00
f2
02
00
00
................
000001e2
`
85b73790
01
00
53
00
74
00
72
00
-
69
00
6e
00
67
00
46
00
..S.t.r.i.n.g.F.
000001e2
`
85b737a0
69
00
6c
00
65
00
49
00
-
6e
00
66
00
6f
00
00
00
i.l.e.I.n.f.o...
000001e2
`
85b737b0
ce
02
00
00
01
00
30
00
-
34
00
30
00
39
00
30
00
......
0.4
.
0.9
.
0.
000001e2
`
85b737c0
34
00
42
00
30
00
00
00
-
4c
00
16
00
01
00
43
00
4.B
.
0.
..L.....C.
000001e2
`
85b737d0
6f
00
6d
00
70
00
61
00
-
6e
00
79
00
4e
00
61
00
o.m.p.a.n.y.N.a.
000001e2
`
85b737e0
6d
00
65
00
00
00
00
00
-
4d
00
69
00
63
00
72
00
m.e.....M.i.c.r.
000001e2
`
85b737f0
6f
00
73
00
6f
00
66
00
-
74
00
20
00
43
00
6f
00
o.s.o.f.t. .C.o.
000001e2
`
85b73800
72
00
70
00
6f
00
72
00
-
61
00
74
00
69
00
6f
00
r.p.o.r.a.t.i.o.
000001e2
`
85b73810
6e
00
00
00
58
00
18
00
-
01
00
46
00
69
00
6c
00
n...X.....F.i.l.
000001e2
`
85b73820
65
00
44
00
65
00
73
00
-
63
00
72
00
69
00
70
00
e.D.e.s.c.r.i.p.
000001e2
`
85b73830
74
00
69
00
6f
00
6e
00
-
00
00
00
00
53
00
79
00
t.i.o.n.....S.y.
000001e2
`
85b73840
73
00
74
00
65
00
6d
00
-
20
00
50
00
72
00
65
00
s.t.e.m. .P.r.e.
000001e2
`
85b73850
70
00
61
00
72
00
61
00
-
74
00
69
00
6f
00
6e
00
p.a.r.a.t.i.o.n.
000001e2
`
85b73860
20
00
54
00
6f
00
6f
00
-
6c
00
00
00
6c
00
26
00
.T.o.o.l...l.&.
000001e2
`
85b73870
01
00
46
00
69
00
6c
00
-
65
00
56
00
65
00
72
00
..F.i.l.e.V.e.r.
000001e2
`
85b73880
73
00
69
00
6f
00
6e
00
-
00
00
00
00
31
00
30
00
s.i.o.n.....
1.0
.
000001e2
`
85b73890
2e
00
30
00
2e
00
31
00
-
39
00
30
00
34
00
31
00
..
0.
..
1.9
.
0.4
.
1.
000001e2
`
85b738a0
2e
00
37
00
34
00
36
00
-
20
00
28
00
57
00
69
00
..
7.4
.
6.
.(.W.i.
000001e2
`
85b738b0
6e
00
42
00
75
00
69
00
-
6c
00
64
00
2e
00
31
00
n.B.u.i.l.d...
1.
000001e2
`
85b738c0
36
00
30
00
31
00
30
00
-
31
00
2e
00
30
00
38
00
6.0
.
1.0
.
1.
..
0.8
.
000001e2
`
85b738d0
30
00
30
00
29
00
00
00
-
38
00
0c
00
01
00
49
00
0.0
.)...
8.
....I.
000001e2
`
85b738e0
6e
00
74
00
65
00
72
00
-
6e
00
61
00
6c
00
4e
00
n.t.e.r.n.a.l.N.
000001e2
`
85b738f0
61
00
6d
00
65
00
00
00
-
73
00
79
00
73
00
70
00
a.m.e...s.y.s.p.
000001e2
`
85b73900
72
00
65
00
70
00
2e
00
-
45
00
58
00
45
00
00
00
r.e.p...E.X.E...
000001e2
`
85b73910
80
00
2e
00
01
00
4c
00
-
65
00
67
00
61
00
6c
00
......L.e.g.a.l.
000001e2
`
85b73920
43
00
6f
00
70
00
79
00
-
72
00
69
00
67
00
68
00
C.o.p.y.r.i.g.h.
000001e2
`
85b73930
74
00
00
00
a9
00
20
00
-
4d
00
69
00
63
00
72
00
t..... .M.i.c.r.
000001e2
`
85b73940
6f
00
73
00
6f
00
66
00
-
74
00
20
00
43
00
6f
00
o.s.o.f.t. .C.o.
000001e2
`
85b73950
72
00
70
00
6f
00
72
00
-
61
00
74
00
69
00
6f
00
r.p.o.r.a.t.i.o.
000001e2
`
85b73960
6e
00
2e
00
20
00
41
00
-
6c
00
6c
00
20
00
72
00
n... .A.l.l. .r.
000001e2
`
85b73970
69
00
67
00
68
00
74
00
-
73
00
20
00
72
00
65
00
i.g.h.t.s. .r.e.
000001e2
`
85b73980
73
00
65
00
72
00
76
00
-
65
00
64
00
2e
00
00
00
s.e.r.v.e.d.....
000001e2
`
85b73990
40
00
0c
00
01
00
4f
00
-
72
00
69
00
67
00
69
00
@.....O.r.i.g.i.
000001e2
`
85b739a0
6e
00
61
00
6c
00
46
00
-
69
00
6c
00
65
00
6e
00
n.a.l.F.i.l.e.n.
000001e2
`
85b739b0
61
00
6d
00
65
00
00
00
-
73
00
79
00
73
00
70
00
a.m.e...s.y.s.p.
000001e2
`
85b739c0
72
00
65
00
70
00
2e
00
-
45
00
58
00
45
00
00
00
r.e.p...E.X.E...
000001e2
`
85b739d0
6a
00
25
00
01
00
50
00
-
72
00
6f
00
64
00
75
00
j.
%
...P.r.o.d.u.
000001e2
`
85b739e0
63
00
74
00
4e
00
61
00
-
6d
00
65
00
00
00
00
00
c.t.N.a.m.e.....
000001e2
`
85b739f0
4d
00
69
00
63
00
72
00
-
6f
00
73
00
6f
00
66
00
M.i.c.r.o.s.o.f.
000001e2
`
85b73a00
74
00
ae
00
20
00
57
00
-
69
00
6e
00
64
00
6f
00
t... .W.i.n.d.o.
000001e2
`
85b73a10
77
00
73
00
ae
00
20
00
-
4f
00
70
00
65
00
72
00
w.s... .O.p.e.r.
000001e2
`
85b73a20
61
00
74
00
69
00
6e
00
-
67
00
20
00
53
00
79
00
a.t.i.n.g. .S.y.
000001e2
`
85b73a30
73
00
74
00
65
00
6d
00
-
00
00
00
00
42
00
0f
00
s.t.e.m.....B...
000001e2
`
85b73a40
01
00
50
00
72
00
6f
00
-
64
00
75
00
63
00
74
00
..P.r.o.d.u.c.t.
000001e2
`
85b73a50
56
00
65
00
72
00
73
00
-
69
00
6f
00
6e
00
00
00
V.e.r.s.i.o.n...
000001e2
`
85b73a60
31
00
30
00
2e
00
30
00
-
2e
00
31
00
39
00
30
00
1.0
...
0.
..
1.9
.
0.
000001e2
`
85b73a70
34
00
31
00
2e
00
37
00
-
34
00
36
00
00
00
00
00
4.1
...
7.4
.
6.
....
000001e2
`
85b73a80
44
00
00
00
01
00
56
00
-
61
00
72
00
46
00
69
00
D.....V.a.r.F.i.
000001e2
`
85b73a90
6c
00
65
00
49
00
6e
00
-
66
00
6f
00
00
00
00
00
l.e.I.n.f.o.....
000001e2
`
85b73aa0
24
00
04
00
00
00
54
00
-
72
00
61
00
6e
00
73
00
$.....T.r.a.n.s.
000001e2
`
85b73ab0
6c
00
61
00
74
00
69
00
-
6f
00
6e
00
00
00
00
00
l.a.t.i.o.n.....
000001e2
`
85b73ac0
09
04
b0
04
46
45
32
58
-
49
44
7c
30
30
31
2e
35
....FE2XID|
001.5
000001e2
`
85b73ad0
00
00
4e
61
6d
65
00
08
-
40
00
00
03
00
0c
00
00
..Name..@.......
000001e2
`
85b73ae0
00
00
00
00
00
41
00
00
-
00
0a
00
00
80
03
08
00
.....A..........
000001e2
`
85b73af0
00
00
f7
02
00
00
03
00
-
00
80
02
0b
00
00
00
ff ................
000001e2
`
85b73b00
ff
01
00
00
80
13
0b
00
-
00
00
ff ff ff
02
00
00
................
000001e2
`
85b73b10
02
08
00
00
00
09
03
00
-
00
0f
03
00
00
02
08
20
...............
000001e2
`
85b73b20
00
00
1f
03
00
00
00
73
-
74
72
69
6e
67
00
00
4f
.......string..O
000001e2
`
85b73b30
76
65
72
72
69
64
65
00
-
00
4e
61
6d
65
00
00
4d
verride..Name..M
000001e2
`
85b73b40
61
70
70
69
6e
67
53
74
-
72
69
6e
67
73
00
01
00
appingStrings...
000001e2
`
85b73b50
00
00
27
03
00
00
00
57
-
4d
49
00
00
50
65
61
6b
..'....WMI..Peak
000001e2
`
85b73b60
55
73
61
67
65
00
13
00
-
00
00
07
00
1c
00
00
00
Usage...........
000001e2
`
85b73b70
02
00
00
00
29
00
00
00
-
0a
00
00
80
03
08
00
00
....)...........
000001e2
`
85b73b80
00
6e
03
00
00
03
00
00
-
80
02
0b
00
00
00
ff ff .n..............
000001e2
`
85b73b90
76
03
00
00
02
08
20
00
-
00
86
03
00
00
00
75
69
v..... .......ui
000001e2
`
85b73ba0
6e
74
33
32
00
00
4d
61
-
70
70
69
6e
67
53
74
72
nt32..MappingStr
000001e2
`
85b73bb0
69
6e
67
73
00
01
00
00
-
00
8e
03
00
00
00
57
4d
ings..........WM
000001e2
`
85b73bc0
49
00
00
53
74
61
74
75
-
73
00
08
40
00
00
04
00
I..Status..@....
000001e2
`
85b73bd0
10
00
00
00
00
00
00
00
-
36
00
00
00
0a
00
00
80
........
6.
......
000001e2
`
85b73be0
23
08
00
00
00
df
03
00
-
00
03
00
00
80
22
0b
00
000001e2
`
85b73bf0
00
00
ff ff e7
03
00
00
-
22
03
00
00
00
0a
00
00
........".......
000001e2
`
85b73c00
00
ef
03
00
00
22
08
20
-
00
00
f9
03
00
00
00
73
.....". .......s
000001e2
`
85b73c10
74
72
69
6e
67
00
00
4d
-
61
78
4c
65
6e
00
00
56
tring..MaxLen..V
000001e2
`
85b73c20
61
6c
75
65
4d
61
70
00
-
0c
00
00
00
2d
04
00
00
alueMap.....
-
...
000001e2
`
85b73c30
31
04
00
00
38
04
00
00
-
42
04
00
00
4b
04
00
00
1.
..
8.
..B...K...
000001e2
`
85b73c40
56
04
00
00
60
04
00
00
-
6a
04
00
00
73
04
00
00
V...`...j...s...
000001e2
`
85b73c50
7d
04
00
00
89
04
00
00
-
95
04
00
00
00
4f
4b
00
}............OK.
000001e2
`
85b73c60
00
45
72
72
6f
72
00
00
-
44
65
67
72
61
64
65
64
.Error..Degraded
000001e2
`
85b73c70
00
00
55
6e
6b
6e
6f
77
-
6e
00
00
50
72
65
64
20
..Unknown..Pred
000001e2
`
85b73c80
46
61
69
6c
00
00
53
74
-
61
72
74
69
6e
67
00
00
Fail..Starting..
000001e2
`
85b73c90
53
74
6f
70
70
69
6e
67
-
00
00
53
65
72
76
69
63
Stopping..Servic
000001e2
`
85b73ca0
65
00
00
53
74
72
65
73
-
73
65
64
00
00
4e
6f
6e
e..Stressed..Non
000001e2
`
85b73cb0
52
65
63
6f
76
65
72
00
-
00
4e
6f
20
43
6f
6e
74
Recover..No Cont
000001e2
`
85b73cc0
61
63
74
00
00
4c
6f
73
-
74
20
43
6f
6d
6d
00
00
act..Lost Comm..
000001e2
`
85b73cd0
54
65
6d
70
50
61
67
65
-
46
69
6c
65
00
0b
00
00
TempPageFile....
000001e2
`
85b73ce0
00
08
00
20
00
00
00
02
-
00
00
00
29
00
00
00
0a
... .......)....
000001e2
`
85b73cf0
00
00
80
03
08
00
00
00
-
e5
04
00
00
03
00
00
80
................
000001e2
`
85b73d00
02
0b
00
00
00
ff ff ee
-
04
00
00
02
08
20
00
00
............. ..
000001e2
`
85b73d10
fe
04
00
00
00
62
6f
6f
-
6c
65
61
6e
00
00
4d
61
.....boolean..Ma
000001e2
`
85b73d20
70
70
69
6e
67
53
74
72
-
69
6e
67
73
00
01
00
00
ppingStrings....
000001e2
`
85b73d30
00
06
05
00
00
00
57
69
-
6e
33
32
52
65
67
69
73
......Win32Regis
000001e2
`
85b73d40
74
72
79
7c
53
79
73
74
-
65
6d
5c
43
75
72
72
65
try
|System\Curre
000001e2
`
85b73d50
6e
74
43
6f
6e
74
72
6f
-
6c
53
65
74
5c
43
6f
6e
ntControlSet\Con
000001e2
`
85b73d60
74
72
6f
6c
5c
53
65
73
-
73
69
6f
6e
20
4d
61
6e
trol\Session Man
000001e2
`
85b73d70
61
67
65
72
5c
4d
65
6d
-
6f
72
79
20
4d
61
6e
61
ager\Memory Mana
000001e2
`
85b73d80
67
65
6d
65
6e
74
7c
54
-
65
6d
70
50
61
67
65
46
gement|TempPageF
000001e2
`
85b73d90
69
6c
65
00
00
00
00
00
-
00
00
00
00
00
00
00
00
ile.............
000001e2
`
85b73da0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73db0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73dc0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73dd0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73de0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73df0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e00
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e10
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e20
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e30
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e40
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e50
00
00
00
00
00
00
00
00
-
00
00
00
00
............
0
:
023
> db
01e2
`
85b73730
l72c
/
/
O.r.i.g.i.
000001e2
`
85b73730
94
03
34
00
00
00
56
00
-
53
00
5f
00
56
00
45
00
..
4.
..V.S._.V.E.
000001e2
`
85b73740
52
00
53
00
49
00
4f
00
-
4e
00
5f
00
49
00
4e
00
R.S.I.O.N._.I.N.
000001e2
`
85b73750
46
00
4f
00
00
00
00
00
-
bd
04
ef fe
00
00
01
00
F.O.............
000001e2
`
85b73760
00
00
0a
00
ea
02
61
4a
-
00
00
0a
00
ea
02
61
4a
......aJ......aJ
000001e2
`
85b73770
3f
00
00
00
00
00
00
00
-
04
00
04
00
01
00
00
00
?...............
000001e2
`
85b73780
00
00
00
00
00
00
00
00
-
00
00
00
00
f2
02
00
00
................
000001e2
`
85b73790
01
00
53
00
74
00
72
00
-
69
00
6e
00
67
00
46
00
..S.t.r.i.n.g.F.
000001e2
`
85b737a0
69
00
6c
00
65
00
49
00
-
6e
00
66
00
6f
00
00
00
i.l.e.I.n.f.o...
000001e2
`
85b737b0
ce
02
00
00
01
00
30
00
-
34
00
30
00
39
00
30
00
......
0.4
.
0.9
.
0.
000001e2
`
85b737c0
34
00
42
00
30
00
00
00
-
4c
00
16
00
01
00
43
00
4.B
.
0.
..L.....C.
000001e2
`
85b737d0
6f
00
6d
00
70
00
61
00
-
6e
00
79
00
4e
00
61
00
o.m.p.a.n.y.N.a.
000001e2
`
85b737e0
6d
00
65
00
00
00
00
00
-
4d
00
69
00
63
00
72
00
m.e.....M.i.c.r.
000001e2
`
85b737f0
6f
00
73
00
6f
00
66
00
-
74
00
20
00
43
00
6f
00
o.s.o.f.t. .C.o.
000001e2
`
85b73800
72
00
70
00
6f
00
72
00
-
61
00
74
00
69
00
6f
00
r.p.o.r.a.t.i.o.
000001e2
`
85b73810
6e
00
00
00
58
00
18
00
-
01
00
46
00
69
00
6c
00
n...X.....F.i.l.
000001e2
`
85b73820
65
00
44
00
65
00
73
00
-
63
00
72
00
69
00
70
00
e.D.e.s.c.r.i.p.
000001e2
`
85b73830
74
00
69
00
6f
00
6e
00
-
00
00
00
00
53
00
79
00
t.i.o.n.....S.y.
000001e2
`
85b73840
73
00
74
00
65
00
6d
00
-
20
00
50
00
72
00
65
00
s.t.e.m. .P.r.e.
000001e2
`
85b73850
70
00
61
00
72
00
61
00
-
74
00
69
00
6f
00
6e
00
p.a.r.a.t.i.o.n.
000001e2
`
85b73860
20
00
54
00
6f
00
6f
00
-
6c
00
00
00
6c
00
26
00
.T.o.o.l...l.&.
000001e2
`
85b73870
01
00
46
00
69
00
6c
00
-
65
00
56
00
65
00
72
00
..F.i.l.e.V.e.r.
000001e2
`
85b73880
73
00
69
00
6f
00
6e
00
-
00
00
00
00
31
00
30
00
s.i.o.n.....
1.0
.
000001e2
`
85b73890
2e
00
30
00
2e
00
31
00
-
39
00
30
00
34
00
31
00
..
0.
..
1.9
.
0.4
.
1.
000001e2
`
85b738a0
2e
00
37
00
34
00
36
00
-
20
00
28
00
57
00
69
00
..
7.4
.
6.
.(.W.i.
000001e2
`
85b738b0
6e
00
42
00
75
00
69
00
-
6c
00
64
00
2e
00
31
00
n.B.u.i.l.d...
1.
000001e2
`
85b738c0
36
00
30
00
31
00
30
00
-
31
00
2e
00
30
00
38
00
6.0
.
1.0
.
1.
..
0.8
.
000001e2
`
85b738d0
30
00
30
00
29
00
00
00
-
38
00
0c
00
01
00
49
00
0.0
.)...
8.
....I.
000001e2
`
85b738e0
6e
00
74
00
65
00
72
00
-
6e
00
61
00
6c
00
4e
00
n.t.e.r.n.a.l.N.
000001e2
`
85b738f0
61
00
6d
00
65
00
00
00
-
73
00
79
00
73
00
70
00
a.m.e...s.y.s.p.
000001e2
`
85b73900
72
00
65
00
70
00
2e
00
-
45
00
58
00
45
00
00
00
r.e.p...E.X.E...
000001e2
`
85b73910
80
00
2e
00
01
00
4c
00
-
65
00
67
00
61
00
6c
00
......L.e.g.a.l.
000001e2
`
85b73920
43
00
6f
00
70
00
79
00
-
72
00
69
00
67
00
68
00
C.o.p.y.r.i.g.h.
000001e2
`
85b73930
74
00
00
00
a9
00
20
00
-
4d
00
69
00
63
00
72
00
t..... .M.i.c.r.
000001e2
`
85b73940
6f
00
73
00
6f
00
66
00
-
74
00
20
00
43
00
6f
00
o.s.o.f.t. .C.o.
000001e2
`
85b73950
72
00
70
00
6f
00
72
00
-
61
00
74
00
69
00
6f
00
r.p.o.r.a.t.i.o.
000001e2
`
85b73960
6e
00
2e
00
20
00
41
00
-
6c
00
6c
00
20
00
72
00
n... .A.l.l. .r.
000001e2
`
85b73970
69
00
67
00
68
00
74
00
-
73
00
20
00
72
00
65
00
i.g.h.t.s. .r.e.
000001e2
`
85b73980
73
00
65
00
72
00
76
00
-
65
00
64
00
2e
00
00
00
s.e.r.v.e.d.....
000001e2
`
85b73990
40
00
0c
00
01
00
4f
00
-
72
00
69
00
67
00
69
00
@.....O.r.i.g.i.
000001e2
`
85b739a0
6e
00
61
00
6c
00
46
00
-
69
00
6c
00
65
00
6e
00
n.a.l.F.i.l.e.n.
000001e2
`
85b739b0
61
00
6d
00
65
00
00
00
-
73
00
79
00
73
00
70
00
a.m.e...s.y.s.p.
000001e2
`
85b739c0
72
00
65
00
70
00
2e
00
-
45
00
58
00
45
00
00
00
r.e.p...E.X.E...
000001e2
`
85b739d0
6a
00
25
00
01
00
50
00
-
72
00
6f
00
64
00
75
00
j.
%
...P.r.o.d.u.
000001e2
`
85b739e0
63
00
74
00
4e
00
61
00
-
6d
00
65
00
00
00
00
00
c.t.N.a.m.e.....
000001e2
`
85b739f0
4d
00
69
00
63
00
72
00
-
6f
00
73
00
6f
00
66
00
M.i.c.r.o.s.o.f.
000001e2
`
85b73a00
74
00
ae
00
20
00
57
00
-
69
00
6e
00
64
00
6f
00
t... .W.i.n.d.o.
000001e2
`
85b73a10
77
00
73
00
ae
00
20
00
-
4f
00
70
00
65
00
72
00
w.s... .O.p.e.r.
000001e2
`
85b73a20
61
00
74
00
69
00
6e
00
-
67
00
20
00
53
00
79
00
a.t.i.n.g. .S.y.
000001e2
`
85b73a30
73
00
74
00
65
00
6d
00
-
00
00
00
00
42
00
0f
00
s.t.e.m.....B...
000001e2
`
85b73a40
01
00
50
00
72
00
6f
00
-
64
00
75
00
63
00
74
00
..P.r.o.d.u.c.t.
000001e2
`
85b73a50
56
00
65
00
72
00
73
00
-
69
00
6f
00
6e
00
00
00
V.e.r.s.i.o.n...
000001e2
`
85b73a60
31
00
30
00
2e
00
30
00
-
2e
00
31
00
39
00
30
00
1.0
...
0.
..
1.9
.
0.
000001e2
`
85b73a70
34
00
31
00
2e
00
37
00
-
34
00
36
00
00
00
00
00
4.1
...
7.4
.
6.
....
000001e2
`
85b73a80
44
00
00
00
01
00
56
00
-
61
00
72
00
46
00
69
00
D.....V.a.r.F.i.
000001e2
`
85b73a90
6c
00
65
00
49
00
6e
00
-
66
00
6f
00
00
00
00
00
l.e.I.n.f.o.....
000001e2
`
85b73aa0
24
00
04
00
00
00
54
00
-
72
00
61
00
6e
00
73
00
$.....T.r.a.n.s.
000001e2
`
85b73ab0
6c
00
61
00
74
00
69
00
-
6f
00
6e
00
00
00
00
00
l.a.t.i.o.n.....
000001e2
`
85b73ac0
09
04
b0
04
46
45
32
58
-
49
44
7c
30
30
31
2e
35
....FE2XID|
001.5
000001e2
`
85b73ad0
00
00
4e
61
6d
65
00
08
-
40
00
00
03
00
0c
00
00
..Name..@.......
000001e2
`
85b73ae0
00
00
00
00
00
41
00
00
-
00
0a
00
00
80
03
08
00
.....A..........
000001e2
`
85b73af0
00
00
f7
02
00
00
03
00
-
00
80
02
0b
00
00
00
ff ................
000001e2
`
85b73b00
ff
01
00
00
80
13
0b
00
-
00
00
ff ff ff
02
00
00
................
000001e2
`
85b73b10
02
08
00
00
00
09
03
00
-
00
0f
03
00
00
02
08
20
...............
000001e2
`
85b73b20
00
00
1f
03
00
00
00
73
-
74
72
69
6e
67
00
00
4f
.......string..O
000001e2
`
85b73b30
76
65
72
72
69
64
65
00
-
00
4e
61
6d
65
00
00
4d
verride..Name..M
000001e2
`
85b73b40
61
70
70
69
6e
67
53
74
-
72
69
6e
67
73
00
01
00
appingStrings...
000001e2
`
85b73b50
00
00
27
03
00
00
00
57
-
4d
49
00
00
50
65
61
6b
..'....WMI..Peak
000001e2
`
85b73b60
55
73
61
67
65
00
13
00
-
00
00
07
00
1c
00
00
00
Usage...........
000001e2
`
85b73b70
02
00
00
00
29
00
00
00
-
0a
00
00
80
03
08
00
00
....)...........
000001e2
`
85b73b80
00
6e
03
00
00
03
00
00
-
80
02
0b
00
00
00
ff ff .n..............
000001e2
`
85b73b90
76
03
00
00
02
08
20
00
-
00
86
03
00
00
00
75
69
v..... .......ui
000001e2
`
85b73ba0
6e
74
33
32
00
00
4d
61
-
70
70
69
6e
67
53
74
72
nt32..MappingStr
000001e2
`
85b73bb0
69
6e
67
73
00
01
00
00
-
00
8e
03
00
00
00
57
4d
ings..........WM
000001e2
`
85b73bc0
49
00
00
53
74
61
74
75
-
73
00
08
40
00
00
04
00
I..Status..@....
000001e2
`
85b73bd0
10
00
00
00
00
00
00
00
-
36
00
00
00
0a
00
00
80
........
6.
......
000001e2
`
85b73be0
23
08
00
00
00
df
03
00
-
00
03
00
00
80
22
0b
00
000001e2
`
85b73bf0
00
00
ff ff e7
03
00
00
-
22
03
00
00
00
0a
00
00
........".......
000001e2
`
85b73c00
00
ef
03
00
00
22
08
20
-
00
00
f9
03
00
00
00
73
.....". .......s
000001e2
`
85b73c10
74
72
69
6e
67
00
00
4d
-
61
78
4c
65
6e
00
00
56
tring..MaxLen..V
000001e2
`
85b73c20
61
6c
75
65
4d
61
70
00
-
0c
00
00
00
2d
04
00
00
alueMap.....
-
...
000001e2
`
85b73c30
31
04
00
00
38
04
00
00
-
42
04
00
00
4b
04
00
00
1.
..
8.
..B...K...
000001e2
`
85b73c40
56
04
00
00
60
04
00
00
-
6a
04
00
00
73
04
00
00
V...`...j...s...
000001e2
`
85b73c50
7d
04
00
00
89
04
00
00
-
95
04
00
00
00
4f
4b
00
}............OK.
000001e2
`
85b73c60
00
45
72
72
6f
72
00
00
-
44
65
67
72
61
64
65
64
.Error..Degraded
000001e2
`
85b73c70
00
00
55
6e
6b
6e
6f
77
-
6e
00
00
50
72
65
64
20
..Unknown..Pred
000001e2
`
85b73c80
46
61
69
6c
00
00
53
74
-
61
72
74
69
6e
67
00
00
Fail..Starting..
000001e2
`
85b73c90
53
74
6f
70
70
69
6e
67
-
00
00
53
65
72
76
69
63
Stopping..Servic
000001e2
`
85b73ca0
65
00
00
53
74
72
65
73
-
73
65
64
00
00
4e
6f
6e
e..Stressed..Non
000001e2
`
85b73cb0
52
65
63
6f
76
65
72
00
-
00
4e
6f
20
43
6f
6e
74
Recover..No Cont
000001e2
`
85b73cc0
61
63
74
00
00
4c
6f
73
-
74
20
43
6f
6d
6d
00
00
act..Lost Comm..
000001e2
`
85b73cd0
54
65
6d
70
50
61
67
65
-
46
69
6c
65
00
0b
00
00
TempPageFile....
000001e2
`
85b73ce0
00
08
00
20
00
00
00
02
-
00
00
00
29
00
00
00
0a
... .......)....
000001e2
`
85b73cf0
00
00
80
03
08
00
00
00
-
e5
04
00
00
03
00
00
80
................
000001e2
`
85b73d00
02
0b
00
00
00
ff ff ee
-
04
00
00
02
08
20
00
00
............. ..
000001e2
`
85b73d10
fe
04
00
00
00
62
6f
6f
-
6c
65
61
6e
00
00
4d
61
.....boolean..Ma
000001e2
`
85b73d20
70
70
69
6e
67
53
74
72
-
69
6e
67
73
00
01
00
00
ppingStrings....
000001e2
`
85b73d30
00
06
05
00
00
00
57
69
-
6e
33
32
52
65
67
69
73
......Win32Regis
000001e2
`
85b73d40
74
72
79
7c
53
79
73
74
-
65
6d
5c
43
75
72
72
65
try
|System\Curre
000001e2
`
85b73d50
6e
74
43
6f
6e
74
72
6f
-
6c
53
65
74
5c
43
6f
6e
ntControlSet\Con
000001e2
`
85b73d60
74
72
6f
6c
5c
53
65
73
-
73
69
6f
6e
20
4d
61
6e
trol\Session Man
000001e2
`
85b73d70
61
67
65
72
5c
4d
65
6d
-
6f
72
79
20
4d
61
6e
61
ager\Memory Mana
000001e2
`
85b73d80
67
65
6d
65
6e
74
7c
54
-
65
6d
70
50
61
67
65
46
gement|TempPageF
000001e2
`
85b73d90
69
6c
65
00
00
00
00
00
-
00
00
00
00
00
00
00
00
ile.............
000001e2
`
85b73da0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73db0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73dc0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73dd0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73de0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73df0
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e00
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e10
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e20
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e30
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e40
00
00
00
00
00
00
00
00
-
00
00
00
00
00
00
00
00
................
000001e2
`
85b73e50
00
00
00
00
00
00
00
00
-
00
00
00
00
............
<?xml version
=
"1.0"
encoding
=
"UTF-8"
standalone
=
"yes"
?>
<assembly xmlns
=
"urn:schemas-microsoft-com:asm.v1"
manifestVersion
=
"1.0"
>
<trustInfo xmlns
=
"urn:schemas-microsoft-com:asm.v3"
>
<security>
<requestedPrivileges>
<requestedExecutionLevel level
=
"requireAdministrator"
uiAccess
=
"false"
><
/
requestedExecutionLevel>
<
/
requestedPrivileges>
<
/
security>
<
/
trustInfo>
<asmv3:application>
<asmv3:windowsSettings xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>
<dpiAware>true<
/
dpiAware>
<autoElevate>true<
/
autoElevate>
<
/
asmv3:windowsSettings>
<
/
asmv3:application>
<
/
assembly>
<?xml version
=
"1.0"
encoding
=
"UTF-8"
standalone
=
"yes"
?>
<assembly xmlns
=
"urn:schemas-microsoft-com:asm.v1"
manifestVersion
=
"1.0"
>
<trustInfo xmlns
=
"urn:schemas-microsoft-com:asm.v3"
>
<security>
<requestedPrivileges>
<requestedExecutionLevel level
=
"requireAdministrator"
uiAccess
=
"false"
><
/
requestedExecutionLevel>
<
/
requestedPrivileges>
<
/
security>
<
/
trustInfo>
<asmv3:application>
<asmv3:windowsSettings xmlns
=
"http://schemas.microsoft.com/SMI/2005/WindowsSettings"
>
<dpiAware>true<
/
dpiAware>
<autoElevate>true<
/
autoElevate>
<
/
asmv3:windowsSettings>
<
/
asmv3:application>
<
/
assembly>
/
/
这里还有一个关键函数,可以定位到这里有问题,如果验证正常的话,Reply应该是返回
0
的,失败就会返回错误代码
Reply
=
AiCheckLUA(v155, (
int
*
)&a4a, v148, v150, v80, (__int64)v79, (__int64)v192, v78, a11, (__int64
*
)&v163);
/
/
经过测试,AiLaunchConsentUI 和 AiCheckLUA 函数都返回了错误值
0x202b
appinfo!AiLaunchConsentUI
+
0x518
:
00007ffc
`
9c3d78b8
e8e3d0ffff call appinfo!AiLaunchProcess (
00007ffc
`
9c3d49a0
)
0
:
021
> gu
appinfo!AiCheckLUA
+
0x343
:
00007ffc
`
9c3d7203
488b7c2468
mov rdi,qword ptr [rsp
+
68h
] ss:
000000e3
`
8a27e698
=
0000000000000000
0
:
021
> gu
appinfo!RAiLaunchAdminProcess
+
0xbe2
:
00007ffc
`
9c3d68a2
894584
mov dword ptr [rbp
-
7Ch
],eax ss:
000000e3
`
8a27e8b4
=
00000000
0
:
021
> r rax
rax
=
000000000000202b
/
/
实际上在下面这段代码出现了错误,AiLaunchProcess 会调用 CreateProcessAsUserW 函数创建 consent 进程,但最终出现了错误
/
/
AiLaunchConsentUI 函数
if
( !v9 )
{
ExitCode
=
AiLaunchProcess(
0i64
, token,
0i64
,
0x1000080u
,
0i64
, Dst,
0x400u
,
0i64
,
pszDesktop,
0i64
, a5,
0i64
,
0
,
0i64
,
0i64
,
0i64
,
(struct _PROCESS_INFORMATION
*
)hThread);
/
/
0
:
035
> dt _PROCESS_INFORMATION e3`
8bcfe370
/
/
Windows_Web!_PROCESS_INFORMATION
/
/
+
0x000
hProcess :
0x00000000
`
00001a3c
Void
/
/
+
0x008
hThread :
0x00000000
`
00001420
Void
/
/
+
0x010
dwProcessId :
0x160c
/
/
pid
5644
/
/
+
0x014
dwThreadId :
0x12d0
v9
=
ExitCode;
if
( !ExitCode )
{
ExitCode
=
AipVerifyConsent(hThread[
0
]);
/
/
验证 consent 进程
v9
=
ExitCode;
if
( !ExitCode )
{
ResumeThread(hThread[
1
]);
/
/
恢复执行 consent
ExitCode
=
WaitForSingleObject(hThread[
0
], dwMilliseconds);
/
/
等待
v9
=
ExitCode;
if
( !ExitCode )
{
if
( !GetExitCodeProcess(hThread[
0
], &ExitCode) )
/
/
这里取出错误代码
/
/
这里还有一个关键函数,可以定位到这里有问题,如果验证正常的话,Reply应该是返回
0
的,失败就会返回错误代码
Reply
=
AiCheckLUA(v155, (
int
*
)&a4a, v148, v150, v80, (__int64)v79, (__int64)v192, v78, a11, (__int64
*
)&v163);
/
/
经过测试,AiLaunchConsentUI 和 AiCheckLUA 函数都返回了错误值
0x202b
appinfo!AiLaunchConsentUI
+
0x518
:
00007ffc
`
9c3d78b8
e8e3d0ffff call appinfo!AiLaunchProcess (
00007ffc
`
9c3d49a0
)
0
:
021
> gu
appinfo!AiCheckLUA
+
0x343
:
00007ffc
`
9c3d7203
488b7c2468
mov rdi,qword ptr [rsp
+
68h
] ss:
000000e3
`
8a27e698
=
0000000000000000
0
:
021
> gu
appinfo!RAiLaunchAdminProcess
+
0xbe2
:
00007ffc
`
9c3d68a2
894584
mov dword ptr [rbp
-
7Ch
],eax ss:
000000e3
`
8a27e8b4
=
00000000
0
:
021
> r rax
rax
=
000000000000202b
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
最后于 2022-6-2 20:55
被嫣语菲菲~编辑
,原因: