├── .gitignore ├── TestCase ├── CVETest │ ├── CVE-2017-8470-GetObject.exe │ ├── CVE-2017-8475-CreateICA.exe │ ├── CVE-2017-8477-wine_test.ttf │ ├── CVE-2017-0259-NtTraceControl.exe │ ├── CVE-2017-11785-NtQueryObject.exe │ ├── CVE-2017-8470-GetObject_v2.exe │ ├── CVE-2017-8472-GetTextMetrics.exe │ ├── CVE-2017-8475-CreateICA_v2.exe │ ├── CVE-2017-8482-RaiseException.exe │ ├── CVE-2017-8490-NtGdiEnumFonts.exe │ ├── CVE-2017-8687-NtGdiDoBanding.exe │ ├── CVE-2017-8469-GetDriveLayoutEx.exe │ ├── CVE-2017-8477-NtGdiMakeFontDir.exe │ ├── CVE-2017-8564-NsiGetParameter.exe │ ├── CVE-2018-0832-GetThreadContext.exe │ ├── CVE-2017-0259-NtTraceControl_v2.exe │ ├── CVE-2017-11785-NtQueryObject_v2.exe │ ├── CVE-2017-8469-GetDriveLayoutEx_v2.exe │ ├── CVE-2017-8472-GetTextMetrics_v2.exe │ ├── CVE-2017-8477-NtGdiMakeFontDir_v2.exe │ ├── CVE-2017-8482-RaiseException_v2.exe │ ├── CVE-2017-8488-MountmgrQueryPoints.exe │ ├── CVE-2017-8490-NtGdiEnumFonts_v2.exe │ ├── CVE-2017-8491-VolumeDiskExtents.exe │ ├── CVE-2017-8492-GetDriveGeometryEx.exe │ ├── CVE-2017-8687-NtGdiDoBanding_v2.exe │ ├── CVE-2018-0832-GetThreadContext_v2.exe │ ├── CVE-2017-0299-ReadDirectoryChanges.exe │ ├── CVE-2017-11831-NtQueryDirectoryFile.exe │ ├── CVE-2017-8491-VolumeDiskExtents_v2.exe │ ├── CVE-2017-8492-GetDriveGeometryEx_v2.exe │ ├── CVE-2017-8680-NtGdiGetGlyphOutline.exe │ ├── CVE-2017-8685-NtGdiEngCreatePalette.exe │ ├── CVE-2017-8708-IOCompletionInfoLeak.exe │ ├── CVE-2018-0969-NtQueryAttributesFile.exe │ ├── CVE-2017-0245-xxxClientLpkDrawTextEx.exe │ ├── CVE-2017-0258-NtQueryInformationToken.exe │ ├── CVE-2017-0299-ReadDirectoryChanges_v2.exe │ ├── CVE-2017-11831-NtQueryDirectoryFile_v2.exe │ ├── CVE-2017-8473-NtGdiGetRealizationInfo.exe │ ├── CVE-2017-8488-MountmgrQueryPoints_v2.exe │ ├── CVE-2017-8680-NtGdiGetGlyphOutline_v2.exe │ ├── CVE-2017-8685-NtGdiEngCreatePalette_v2.exe │ ├── CVE-2017-8708-IOCompletionInfoLeak_v2.exe │ ├── CVE-2018-0894-NtQueryVirtualMemory_x64.exe │ ├── CVE-2018-0897-KiDispatchException_x64.exe │ ├── CVE-2018-0901-NtWaitForDebugEvent_x64.exe │ ├── CVE-2018-0969-NtQueryAttributesFile_v2.exe │ ├── CVE-2018-0974-NtQueryVirtualMemory_x64.exe │ ├── CVE-2017-0167-xxxSendMenuDrawItemMessage.exe │ ├── CVE-2017-0245-xxxClientLpkDrawTextEx_v2.exe │ ├── CVE-2017-0258-NtQueryInformationToken_v2.exe │ ├── CVE-2017-8476-NtQueryInformationProcess.exe │ ├── CVE-2017-8485-QueryInformationJobObject.exe │ ├── CVE-2018-0975-NtQueryFullAttributesFile.exe │ ├── CVE-2017-0167-xxxSendMenuDrawItemMessage_v2.exe │ ├── CVE-2017-8462-NtQueryVolumeInformationFile.exe │ ├── CVE-2017-8476-NtQueryInformationProcess_v2.exe │ ├── CVE-2017-8480-NtQueryInformationTransaction.exe │ ├── CVE-2017-8485-QueryInformationJobObject_v2.exe │ ├── CVE-2017-8489-BCryptOpenAlgorithmProvider.exe │ ├── CVE-2018-0895-NtQueryInformationThread_x64.exe │ ├── CVE-2018-0971-NtQuerySystemInformation_x64.exe │ ├── CVE-2018-0972-NtQueryInformationTransaction.exe │ ├── CVE-2018-0973-NtQueryInformationProcess_x64.exe │ ├── CVE-2018-0975-NtQueryFullAttributesFile_v2.exe │ ├── CVE-2017-0300-NtQueryInformationWorkerFactory.exe │ ├── CVE-2017-8462-NtQueryVolumeInformationFile_v2.exe │ ├── CVE-2017-8489-BCryptOpenAlgorithmProvider_v2.exe │ ├── CVE-2018-0745-NtQueryInformationProcess_win10.exe │ ├── CVE-2018-0746-NtQuerySystemInformation_win10.exe │ ├── CVE-2018-0968-NtQueryVirtualMemory_win10_x64.exe │ ├── CVE-2017-0300-NtQueryInformationWorkerFactory_v2.exe │ ├── CVE-2017-8478-QueryInformationJobObject_class12.exe │ ├── CVE-2017-8479-QueryInformationJobObject_class28.exe │ ├── CVE-2017-8480-NtQueryInformationTransaction_v2.exe │ ├── CVE-2017-8481-NtQueryInformationResourceManager.exe │ ├── CVE-2017-8678-NtQueryCompositionSurfaceBinding.exe │ ├── CVE-2017-8681-NtGdiGetPhysicalMonitorDescription.exe │ ├── CVE-2017-8684-NtGdiGetFontResourceInfoInternalW.exe │ ├── CVE-2018-0746-NtQuerySystemInformation_win10_v2.exe │ ├── CVE-2018-0968-NtQueryVirtualMemory_win10_x64_v2.exe │ ├── CVE-2018-0970-NtQueryVolumeInformationFile_IOSB.exe │ ├── CVE-2018-0972-NtQueryInformationTransaction_v2.exe │ ├── CVE-2017-8471-NtGdiGetOutlineTextMetricsInternalW.exe │ ├── CVE-2017-8478-QueryInformationJobObject_class12_v2.exe │ ├── CVE-2017-8479-QueryInformationJobObject_class28_v2.exe │ ├── CVE-2017-8481-NtQueryInformationResourceManager_v2.exe │ ├── CVE-2017-8484-NtGdiGetOutlineTextMetricsInternalW.exe │ ├── CVE-2017-8678-NtQueryCompositionSurfaceBinding_v2.exe │ ├── CVE-2017-8684-NtGdiGetFontResourceInfoInternalW_v2.exe │ ├── CVE-2018-0970-NtQueryVolumeInformationFile_IOSB_v2.exe │ ├── CVE-2017-8471-NtGdiGetOutlineTextMetricsInternalW_v2.exe │ └── CVE-2017-8484-NtGdiGetOutlineTextMetricsInternalW_v2.exe └── ReactOS0.4.9 │ ├── unit_module_test │ ├── kmtests │ │ ├── kmtest_.exe │ │ ├── kmtest_drv.sys │ │ ├── tcpip │ │ │ └── tcpip_drv.sys │ │ ├── hidparse │ │ │ └── hidp_drv.sys │ │ ├── ntos_po │ │ │ └── poirp_drv.sys │ │ ├── example │ │ │ └── example_drv.sys │ │ ├── ntos_io │ │ │ ├── iohelper_drv.sys │ │ │ ├── ioreadwrite_drv.sys │ │ │ ├── iocreatefile_drv.sys │ │ │ └── iodeviceobject_drv.sys │ │ ├── kernel32 │ │ │ └── kernel32_drv.sys │ │ ├── ntos_cc │ │ │ ├── cccopyread_drv.sys │ │ │ └── ccmapdata_drv.sys │ │ ├── ntos_mm │ │ │ ├── ntcreatesection_drv.sys │ │ │ └── mmmaplockedpagesspecifycache_drv.sys │ │ └── fltmgr │ │ │ ├── fltmgr_load │ │ │ └── fltmgrload_drv.sys │ │ │ ├── fltmgr_create │ │ │ └── fltmgr_create.sys │ │ │ └── fltmgr_register │ │ │ └── fltmgrreg_drv.sys │ ├── win32 │ │ ├── cmd │ │ │ └── cmd_rostest.exe │ │ ├── user32 │ │ │ ├── sysicon │ │ │ │ └── sysicon.exe │ │ │ └── paintdesktop │ │ │ │ └── paintdesktop.exe │ │ ├── advapi32 │ │ │ └── eventlog │ │ │ │ ├── evtlogtest.exe │ │ │ │ └── myeventprovider.dll │ │ ├── comctl32 │ │ │ └── buttonvistest │ │ │ │ └── buttonvistest.exe │ │ └── kernel32 │ │ │ └── notificationtest │ │ │ └── notificationtest.exe │ ├── winetests │ │ ├── msi │ │ │ ├── custom.dll │ │ │ └── msi_winetest.exe │ │ ├── atl │ │ │ └── atl_winetest.exe │ │ ├── cmd │ │ │ └── cmd_winetest.exe │ │ ├── hid │ │ │ └── hid_winetest.exe │ │ ├── mpr │ │ │ └── mpr_winetest.exe │ │ ├── pdh │ │ │ └── pdh_winetest.exe │ │ ├── reg │ │ │ └── reg_winetest.exe │ │ ├── sti │ │ │ └── sti_winetest.exe │ │ ├── sxs │ │ │ └── sxs_winetest.exe │ │ ├── itss │ │ │ └── itss_winetest.exe │ │ ├── lz32 │ │ │ └── lz32_winetest.exe │ │ ├── qmgr │ │ │ └── qmgr_winetest.exe │ │ ├── atl80 │ │ │ └── atl80_winetest.exe │ │ ├── d3drm │ │ │ └── d3drm_winetest.exe │ │ ├── gdi32 │ │ │ └── gdi32_winetest.exe │ │ ├── hlink │ │ │ └── hlink_winetest.exe │ │ ├── imm32 │ │ │ └── imm32_winetest.exe │ │ ├── mlang │ │ │ └── mlang_winetest.exe │ │ ├── mscms │ │ │ └── mscms_winetest.exe │ │ ├── msctf │ │ │ └── msctf_winetest.exe │ │ ├── ntdll │ │ │ └── ntdll_winetest.exe │ │ ├── ole32 │ │ │ └── ole32_winetest.exe │ │ ├── psapi │ │ │ └── psapi_winetest.exe │ │ ├── qedit │ │ │ └── qedit_winetest.exe │ │ ├── usp10 │ │ │ └── usp10_winetest.exe │ │ ├── winmm │ │ │ └── winmm_winetest.exe │ │ ├── wshom │ │ │ └── wshom_winetest.exe │ │ ├── xcopy │ │ │ └── xcopy_winetest.exe │ │ ├── atl100 │ │ │ └── atl100_winetest.exe │ │ ├── bcrypt │ │ │ └── bcrypt_winetest.exe │ │ ├── comcat │ │ │ └── comcat_winetest.exe │ │ ├── credui │ │ │ └── credui_winetest.exe │ │ ├── dinput │ │ │ └── dinput_winetest.exe │ │ ├── dnsapi │ │ │ └── dnsapi_winetest.exe │ │ ├── dplayx │ │ │ └── dplayx_winetest.exe │ │ ├── dsound │ │ │ └── dsound_winetest.exe │ │ ├── fusion │ │ │ └── fusion_winetest.exe │ │ ├── mapi32 │ │ │ └── mapi32_winetest.exe │ │ ├── mshtml │ │ │ └── mshtml_winetest.exe │ │ ├── mstask │ │ │ └── mstask_winetest.exe │ │ ├── msvcrt │ │ │ └── msvcrt_winetest.exe │ │ ├── msxml3 │ │ │ └── msxml3_winetest.exe │ │ ├── oleacc │ │ │ └── oleacc_winetest.exe │ │ ├── oledlg │ │ │ └── oledlg_winetest.exe │ │ ├── quartz │ │ │ └── quartz_winetest.exe │ │ ├── rpcrt4 │ │ │ └── rpcrt4_winetest.exe │ │ ├── rsaenh │ │ │ └── rsaenh_winetest.exe │ │ ├── scrrun │ │ │ └── scrrun_winetest.exe │ │ ├── urlmon │ │ │ └── urlmon_winetest.exe │ │ ├── user32 │ │ │ └── user32_winetest.exe │ │ ├── ws2_32 │ │ │ └── ws2_32_winetest.exe │ │ ├── advapi32 │ │ │ └── advapi32_winetest.exe │ │ ├── advpack │ │ │ └── advpack_winetest.exe │ │ ├── amstream │ │ │ └── amstream_winetest.exe │ │ ├── avifil32 │ │ │ └── avifil32_winetest.exe │ │ ├── browseui │ │ │ └── browseui_winetest.exe │ │ ├── cabinet │ │ │ └── cabinet_winetest.exe │ │ ├── comctl32 │ │ │ └── comctl32_winetest.exe │ │ ├── comdlg32 │ │ │ └── comdlg32_winetest.exe │ │ ├── crypt32 │ │ │ └── crypt32_winetest.exe │ │ ├── cryptnet │ │ │ └── cryptnet_winetest.exe │ │ ├── cryptui │ │ │ └── cryptui_winetest.exe │ │ ├── devenum │ │ │ └── devenum_winetest.exe │ │ ├── dxdiagn │ │ │ └── dxdiagn_winetest.exe │ │ ├── faultrep │ │ │ └── faultrep_winetest.exe │ │ ├── gdiplus │ │ │ └── gdiplus_winetest.exe │ │ ├── hnetcfg │ │ │ └── hnetcfg_winetest.exe │ │ ├── imagehlp │ │ │ └── imagehlp_winetest.exe │ │ ├── inetcomm │ │ │ └── inetcomm_winetest.exe │ │ ├── inetmib1 │ │ │ └── inetmib1_winetest.exe │ │ ├── iphlpapi │ │ │ └── iphlpapi_winetest.exe │ │ ├── jscript │ │ │ └── jscript_winetest.exe │ │ ├── kernel32 │ │ │ └── kernel32_winetest.exe │ │ ├── localspl │ │ │ └── localspl_winetest.exe │ │ ├── localui │ │ │ └── localui_winetest.exe │ │ ├── mmdevapi │ │ │ └── mmdevapi_winetest.exe │ │ ├── msacm32 │ │ │ └── msacm32_winetest.exe │ │ ├── mscoree │ │ │ └── mscoree_winetest.exe │ │ ├── msrle32 │ │ │ └── msrle32_winetest.exe │ │ ├── msvcrtd │ │ │ └── msvcrtd_winetest.exe │ │ ├── msvfw32 │ │ │ └── msvfw32_winetest.exe │ │ ├── netapi32 │ │ │ └── netapi32_winetest.exe │ │ ├── netcfgx │ │ │ └── netcfgx_winetest.exe │ │ ├── ntdsapi │ │ │ └── ntdsapi_winetest.exe │ │ ├── odbccp32 │ │ │ └── odbccp32_winetest.exe │ │ ├── oleaut32 │ │ │ └── oleaut32_winetest.exe │ │ ├── opengl32 │ │ │ └── opengl32_winetest.exe │ │ ├── propsys │ │ │ └── propsys_winetest.exe │ │ ├── rasapi32 │ │ │ └── rasapi32_winetest.exe │ │ ├── regedit │ │ │ └── regedit_winetest.exe │ │ ├── riched20 │ │ │ └── riched20_winetest.exe │ │ ├── riched32 │ │ │ └── riched32_winetest.exe │ │ ├── schannel │ │ │ └── schannel_winetest.exe │ │ ├── secur32 │ │ │ └── secur32_winetest.exe │ │ ├── serialui │ │ │ └── serialui_winetest.exe │ │ ├── services │ │ │ └── services_winetest.exe │ │ ├── setupapi │ │ │ └── setupapi_winetest.exe │ │ ├── shdocvw │ │ │ └── shdocvw_winetest.exe │ │ ├── shell32 │ │ │ └── shell32_winetest.exe │ │ ├── shlwapi │ │ │ └── shlwapi_winetest.exe │ │ ├── snmpapi │ │ │ └── snmpapi_winetest.exe │ │ ├── spoolss │ │ │ └── spoolss_winetest.exe │ │ ├── twain_32 │ │ │ └── twain_32_winetest.exe │ │ ├── userenv │ │ │ └── userenv_winetest.exe │ │ ├── uxtheme │ │ │ └── uxtheme_winetest.exe │ │ ├── vbscript │ │ │ └── vbscript_winetest.exe │ │ ├── version │ │ │ └── version_winetest.exe │ │ ├── wbemdisp │ │ │ └── wbemdisp_winetest.exe │ │ ├── wbemprox │ │ │ └── wbemprox_winetest.exe │ │ ├── winhttp │ │ │ └── winhttp_winetest.exe │ │ ├── wininet │ │ │ └── wininet_winetest.exe │ │ ├── wintrust │ │ │ └── wintrust_winetest.exe │ │ ├── wldap32 │ │ │ └── wldap32_winetest.exe │ │ ├── wmiutils │ │ │ └── wmiutils_winetest.exe │ │ ├── wmvcore │ │ │ └── wmvcore_winetest.exe │ │ ├── wscript │ │ │ └── wscript_winetest.exe │ │ ├── wtsapi32 │ │ │ └── wtsapi32_winetest.exe │ │ ├── xmllite │ │ │ └── xmllite_winetest.exe │ │ ├── xinput1_3 │ │ │ └── xinput1_3_winetest.exe │ │ ├── windowscodecs │ │ │ └── windowscodecs_winetest.exe │ │ └── windowscodecsext │ │ │ └── windowscodecsext_winetest.exe │ ├── rosautotest │ │ └── rosautotest.exe │ ├── tests │ │ ├── pseh2 │ │ │ ├── pseh2_test.exe │ │ │ └── pseh2_test_cpp.exe │ │ ├── dllexport │ │ │ ├── dllexport_test.exe │ │ │ ├── dllimport_test.dll │ │ │ ├── dllexport_test_dll1.dll │ │ │ └── dllexport_test_dll2.dll │ │ └── mmixer_test │ │ │ └── mmixer_test.exe │ ├── apitests │ │ ├── afd │ │ │ └── afd_apitest.exe │ │ ├── atl │ │ │ └── atl_apitest.exe │ │ ├── com │ │ │ └── com_apitest.exe │ │ ├── sdk │ │ │ └── sdk_apitest.exe │ │ ├── gdi32 │ │ │ └── gdi32_apitest.exe │ │ ├── ntdll │ │ │ └── ntdll_apitest.exe │ │ ├── ole32 │ │ │ └── ole32_apitest.exe │ │ ├── psapi │ │ │ └── psapi_apitest.exe │ │ ├── crt │ │ │ ├── crtdll_crt_apitest.exe │ │ │ ├── msvcrt_crt_apitest.exe │ │ │ ├── ntdll_crt_apitest.exe │ │ │ └── msvcrt_crt_dll_startup.dll │ │ ├── dnsapi │ │ │ └── dnsapi_apitest.exe │ │ ├── msgina │ │ │ └── msgina_apitest.exe │ │ ├── msvcrt │ │ │ ├── msvcrt_apitest.exe │ │ │ └── CmdLineUtil │ │ │ │ └── cmdlineutil.exe │ │ ├── pefile │ │ │ └── pefile_apitest.exe │ │ ├── user32 │ │ │ └── user32_apitest.exe │ │ ├── ws2_32 │ │ │ └── ws2_32_apitest.exe │ │ ├── apphelp │ │ │ └── apphelp_apitest.exe │ │ ├── appshim │ │ │ └── appshim_apitest.exe │ │ ├── dbghelp │ │ │ └── dbghelp_apitest.exe │ │ ├── shell32 │ │ │ └── shell32_apitest.exe │ │ ├── shlwapi │ │ │ └── shlwapi_apitest.exe │ │ ├── spoolss │ │ │ └── spoolss_apitest.exe │ │ ├── userenv │ │ │ └── userenv_apitest.exe │ │ ├── uxtheme │ │ │ └── uxtheme_apitest.exe │ │ ├── win32nt │ │ │ └── win32knt_apitest.exe │ │ ├── win32u │ │ │ ├── win32u_ros │ │ │ │ └── win32u.dll │ │ │ ├── win32u_xpsp2 │ │ │ │ └── win32u_xpsp2.dll │ │ │ └── win32u_2k3sp2 │ │ │ │ └── win32u_2k3sp2.dll │ │ ├── winhttp │ │ │ └── winhttp_apitest.exe │ │ ├── wininet │ │ │ └── wininet_apitest.exe │ │ ├── wlanapi │ │ │ └── wlanapi_apitest.exe │ │ ├── advapi32 │ │ │ └── advapi32_apitest.exe │ │ ├── browseui │ │ │ └── browseui_apitest.exe │ │ ├── comctl32 │ │ │ └── comctl32_apitest.exe │ │ ├── dciman32 │ │ │ └── dciman32_apitest.exe │ │ ├── iphlpapi │ │ │ └── iphlpapi_apitest.exe │ │ ├── kernel32 │ │ │ ├── kernel32_apitest.exe │ │ │ └── redirptest │ │ │ │ ├── redirtest1.dll │ │ │ │ └── redirtest2.dll │ │ ├── localspl │ │ │ ├── localspl_apitest.exe │ │ │ └── dll │ │ │ │ └── localspl_apitest.dll │ │ ├── netapi32 │ │ │ └── netapi32_apitest.exe │ │ ├── netshell │ │ │ └── netshell_apitest.exe │ │ ├── powrprof │ │ │ └── powrprof_apitest.exe │ │ ├── setupapi │ │ │ └── setupapi_apitest.exe │ │ ├── winprint │ │ │ └── winprint_apitest.exe │ │ ├── winspool │ │ │ └── winspool_apitest.exe │ │ └── user32_dynamic │ │ │ └── user32_dynamic_apitest.exe │ └── drivers │ │ └── tcpip │ │ └── tcpip_drvtest.exe │ └── run_testcase.py ├── README.md ├── TaintLogDemo ├── taint_log_5ba46796.html ├── taint_log_5bab6556.html ├── taint_log_5bcc92d3.html ├── taint_log_5b7f7195.html └── taint_log_5b8ba9b1.html └── DifferentReplayLogDemo ├── different_replay_3.log ├── different_replay_1.log ├── different_replay_0.log └── different_replay_2.log /.gitignore: -------------------------------------------------------------------------------- 1 | .DS_Store 2 | -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8470-GetObject.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8470-GetObject.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8475-CreateICA.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8475-CreateICA.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8477-wine_test.ttf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8477-wine_test.ttf -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0259-NtTraceControl.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0259-NtTraceControl.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-11785-NtQueryObject.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-11785-NtQueryObject.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8470-GetObject_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8470-GetObject_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8472-GetTextMetrics.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8472-GetTextMetrics.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8475-CreateICA_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8475-CreateICA_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8482-RaiseException.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8482-RaiseException.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8490-NtGdiEnumFonts.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8490-NtGdiEnumFonts.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8687-NtGdiDoBanding.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8687-NtGdiDoBanding.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8469-GetDriveLayoutEx.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8469-GetDriveLayoutEx.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8477-NtGdiMakeFontDir.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8477-NtGdiMakeFontDir.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8564-NsiGetParameter.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8564-NsiGetParameter.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0832-GetThreadContext.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0832-GetThreadContext.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0259-NtTraceControl_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0259-NtTraceControl_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-11785-NtQueryObject_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-11785-NtQueryObject_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8469-GetDriveLayoutEx_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8469-GetDriveLayoutEx_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8472-GetTextMetrics_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8472-GetTextMetrics_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8477-NtGdiMakeFontDir_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8477-NtGdiMakeFontDir_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8482-RaiseException_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8482-RaiseException_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8488-MountmgrQueryPoints.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8488-MountmgrQueryPoints.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8490-NtGdiEnumFonts_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8490-NtGdiEnumFonts_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8491-VolumeDiskExtents.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8491-VolumeDiskExtents.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8492-GetDriveGeometryEx.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8492-GetDriveGeometryEx.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8687-NtGdiDoBanding_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8687-NtGdiDoBanding_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0832-GetThreadContext_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0832-GetThreadContext_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0299-ReadDirectoryChanges.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0299-ReadDirectoryChanges.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-11831-NtQueryDirectoryFile.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-11831-NtQueryDirectoryFile.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8491-VolumeDiskExtents_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8491-VolumeDiskExtents_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8492-GetDriveGeometryEx_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8492-GetDriveGeometryEx_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8680-NtGdiGetGlyphOutline.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8680-NtGdiGetGlyphOutline.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8685-NtGdiEngCreatePalette.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8685-NtGdiEngCreatePalette.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8708-IOCompletionInfoLeak.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8708-IOCompletionInfoLeak.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0969-NtQueryAttributesFile.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0969-NtQueryAttributesFile.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0245-xxxClientLpkDrawTextEx.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0245-xxxClientLpkDrawTextEx.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0258-NtQueryInformationToken.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0258-NtQueryInformationToken.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0299-ReadDirectoryChanges_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0299-ReadDirectoryChanges_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-11831-NtQueryDirectoryFile_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-11831-NtQueryDirectoryFile_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8473-NtGdiGetRealizationInfo.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8473-NtGdiGetRealizationInfo.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8488-MountmgrQueryPoints_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8488-MountmgrQueryPoints_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8680-NtGdiGetGlyphOutline_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8680-NtGdiGetGlyphOutline_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8685-NtGdiEngCreatePalette_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8685-NtGdiEngCreatePalette_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8708-IOCompletionInfoLeak_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8708-IOCompletionInfoLeak_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0894-NtQueryVirtualMemory_x64.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0894-NtQueryVirtualMemory_x64.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0897-KiDispatchException_x64.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0897-KiDispatchException_x64.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0901-NtWaitForDebugEvent_x64.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0901-NtWaitForDebugEvent_x64.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0969-NtQueryAttributesFile_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0969-NtQueryAttributesFile_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0974-NtQueryVirtualMemory_x64.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0974-NtQueryVirtualMemory_x64.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/kmtest_.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/kmtest_.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0167-xxxSendMenuDrawItemMessage.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0167-xxxSendMenuDrawItemMessage.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0245-xxxClientLpkDrawTextEx_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0245-xxxClientLpkDrawTextEx_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0258-NtQueryInformationToken_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0258-NtQueryInformationToken_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8476-NtQueryInformationProcess.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8476-NtQueryInformationProcess.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8485-QueryInformationJobObject.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8485-QueryInformationJobObject.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0975-NtQueryFullAttributesFile.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0975-NtQueryFullAttributesFile.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/kmtest_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/kmtest_drv.sys -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0167-xxxSendMenuDrawItemMessage_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0167-xxxSendMenuDrawItemMessage_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8462-NtQueryVolumeInformationFile.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8462-NtQueryVolumeInformationFile.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8476-NtQueryInformationProcess_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8476-NtQueryInformationProcess_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8480-NtQueryInformationTransaction.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8480-NtQueryInformationTransaction.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8485-QueryInformationJobObject_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8485-QueryInformationJobObject_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8489-BCryptOpenAlgorithmProvider.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8489-BCryptOpenAlgorithmProvider.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0895-NtQueryInformationThread_x64.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0895-NtQueryInformationThread_x64.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0971-NtQuerySystemInformation_x64.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0971-NtQuerySystemInformation_x64.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0972-NtQueryInformationTransaction.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0972-NtQueryInformationTransaction.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0973-NtQueryInformationProcess_x64.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0973-NtQueryInformationProcess_x64.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0975-NtQueryFullAttributesFile_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0975-NtQueryFullAttributesFile_v2.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/win32/cmd/cmd_rostest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/win32/cmd/cmd_rostest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/msi/custom.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/msi/custom.dll -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0300-NtQueryInformationWorkerFactory.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0300-NtQueryInformationWorkerFactory.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8462-NtQueryVolumeInformationFile_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8462-NtQueryVolumeInformationFile_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8489-BCryptOpenAlgorithmProvider_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8489-BCryptOpenAlgorithmProvider_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0745-NtQueryInformationProcess_win10.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0745-NtQueryInformationProcess_win10.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0746-NtQuerySystemInformation_win10.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0746-NtQuerySystemInformation_win10.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0968-NtQueryVirtualMemory_win10_x64.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0968-NtQueryVirtualMemory_win10_x64.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/tcpip/tcpip_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/tcpip/tcpip_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/rosautotest/rosautotest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/rosautotest/rosautotest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/tests/pseh2/pseh2_test.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/tests/pseh2/pseh2_test.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-0300-NtQueryInformationWorkerFactory_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-0300-NtQueryInformationWorkerFactory_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8478-QueryInformationJobObject_class12.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8478-QueryInformationJobObject_class12.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8479-QueryInformationJobObject_class28.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8479-QueryInformationJobObject_class28.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8480-NtQueryInformationTransaction_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8480-NtQueryInformationTransaction_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8481-NtQueryInformationResourceManager.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8481-NtQueryInformationResourceManager.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8678-NtQueryCompositionSurfaceBinding.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8678-NtQueryCompositionSurfaceBinding.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8681-NtGdiGetPhysicalMonitorDescription.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8681-NtGdiGetPhysicalMonitorDescription.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8684-NtGdiGetFontResourceInfoInternalW.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8684-NtGdiGetFontResourceInfoInternalW.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0746-NtQuerySystemInformation_win10_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0746-NtQuerySystemInformation_win10_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0968-NtQueryVirtualMemory_win10_x64_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0968-NtQueryVirtualMemory_win10_x64_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0970-NtQueryVolumeInformationFile_IOSB.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0970-NtQueryVolumeInformationFile_IOSB.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0972-NtQueryInformationTransaction_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0972-NtQueryInformationTransaction_v2.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/afd/afd_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/afd/afd_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/atl/atl_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/atl/atl_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/com/com_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/com/com_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/sdk/sdk_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/sdk/sdk_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/hidparse/hidp_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/hidparse/hidp_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_po/poirp_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_po/poirp_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/tests/pseh2/pseh2_test_cpp.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/tests/pseh2/pseh2_test_cpp.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/atl/atl_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/atl/atl_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/cmd/cmd_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/cmd/cmd_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/hid/hid_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/hid/hid_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/mpr/mpr_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/mpr/mpr_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/msi/msi_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/msi/msi_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/pdh/pdh_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/pdh/pdh_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/reg/reg_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/reg/reg_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/sti/sti_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/sti/sti_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/sxs/sxs_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/sxs/sxs_winetest.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8471-NtGdiGetOutlineTextMetricsInternalW.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8471-NtGdiGetOutlineTextMetricsInternalW.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8478-QueryInformationJobObject_class12_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8478-QueryInformationJobObject_class12_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8479-QueryInformationJobObject_class28_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8479-QueryInformationJobObject_class28_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8481-NtQueryInformationResourceManager_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8481-NtQueryInformationResourceManager_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8484-NtGdiGetOutlineTextMetricsInternalW.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8484-NtGdiGetOutlineTextMetricsInternalW.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8678-NtQueryCompositionSurfaceBinding_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8678-NtQueryCompositionSurfaceBinding_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8684-NtGdiGetFontResourceInfoInternalW_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8684-NtGdiGetFontResourceInfoInternalW_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2018-0970-NtQueryVolumeInformationFile_IOSB_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2018-0970-NtQueryVolumeInformationFile_IOSB_v2.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/gdi32/gdi32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/gdi32/gdi32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/ntdll/ntdll_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/ntdll/ntdll_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/ole32/ole32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/ole32/ole32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/psapi/psapi_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/psapi/psapi_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/drivers/tcpip/tcpip_drvtest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/drivers/tcpip/tcpip_drvtest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/example/example_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/example/example_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_io/iohelper_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_io/iohelper_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/win32/user32/sysicon/sysicon.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/win32/user32/sysicon/sysicon.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/itss/itss_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/itss/itss_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/lz32/lz32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/lz32/lz32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/qmgr/qmgr_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/qmgr/qmgr_winetest.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8471-NtGdiGetOutlineTextMetricsInternalW_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8471-NtGdiGetOutlineTextMetricsInternalW_v2.exe -------------------------------------------------------------------------------- /TestCase/CVETest/CVE-2017-8484-NtGdiGetOutlineTextMetricsInternalW_v2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/CVETest/CVE-2017-8484-NtGdiGetOutlineTextMetricsInternalW_v2.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/crt/crtdll_crt_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/crt/crtdll_crt_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/crt/msvcrt_crt_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/crt/msvcrt_crt_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/crt/ntdll_crt_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/crt/ntdll_crt_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/dnsapi/dnsapi_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/dnsapi/dnsapi_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/msgina/msgina_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/msgina/msgina_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/msvcrt/msvcrt_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/msvcrt/msvcrt_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/pefile/pefile_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/pefile/pefile_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/user32/user32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/user32/user32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/ws2_32/ws2_32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/ws2_32/ws2_32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/kernel32/kernel32_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/kernel32/kernel32_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_cc/cccopyread_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_cc/cccopyread_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_cc/ccmapdata_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_cc/ccmapdata_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_io/ioreadwrite_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_io/ioreadwrite_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/tests/dllexport/dllexport_test.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/tests/dllexport/dllexport_test.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/tests/dllexport/dllimport_test.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/tests/dllexport/dllimport_test.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/tests/mmixer_test/mmixer_test.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/tests/mmixer_test/mmixer_test.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/atl80/atl80_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/atl80/atl80_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/d3drm/d3drm_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/d3drm/d3drm_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/gdi32/gdi32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/gdi32/gdi32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/hlink/hlink_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/hlink/hlink_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/imm32/imm32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/imm32/imm32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/mlang/mlang_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/mlang/mlang_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/mscms/mscms_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/mscms/mscms_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/msctf/msctf_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/msctf/msctf_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/ntdll/ntdll_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/ntdll/ntdll_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/ole32/ole32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/ole32/ole32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/psapi/psapi_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/psapi/psapi_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/qedit/qedit_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/qedit/qedit_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/usp10/usp10_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/usp10/usp10_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/winmm/winmm_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/winmm/winmm_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wshom/wshom_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wshom/wshom_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/xcopy/xcopy_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/xcopy/xcopy_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/apphelp/apphelp_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/apphelp/apphelp_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/appshim/appshim_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/appshim/appshim_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/dbghelp/dbghelp_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/dbghelp/dbghelp_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/shell32/shell32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/shell32/shell32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/shlwapi/shlwapi_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/shlwapi/shlwapi_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/spoolss/spoolss_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/spoolss/spoolss_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/userenv/userenv_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/userenv/userenv_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/uxtheme/uxtheme_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/uxtheme/uxtheme_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/win32nt/win32knt_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/win32nt/win32knt_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/win32u/win32u_ros/win32u.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/win32u/win32u_ros/win32u.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/winhttp/winhttp_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/winhttp/winhttp_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/wininet/wininet_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/wininet/wininet_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/wlanapi/wlanapi_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/wlanapi/wlanapi_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_io/iocreatefile_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_io/iocreatefile_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/atl100/atl100_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/atl100/atl100_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/bcrypt/bcrypt_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/bcrypt/bcrypt_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/comcat/comcat_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/comcat/comcat_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/credui/credui_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/credui/credui_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/dinput/dinput_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/dinput/dinput_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/dnsapi/dnsapi_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/dnsapi/dnsapi_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/dplayx/dplayx_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/dplayx/dplayx_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/dsound/dsound_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/dsound/dsound_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/fusion/fusion_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/fusion/fusion_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/mapi32/mapi32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/mapi32/mapi32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/mshtml/mshtml_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/mshtml/mshtml_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/mstask/mstask_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/mstask/mstask_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/msvcrt/msvcrt_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/msvcrt/msvcrt_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/msxml3/msxml3_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/msxml3/msxml3_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/oleacc/oleacc_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/oleacc/oleacc_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/oledlg/oledlg_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/oledlg/oledlg_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/quartz/quartz_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/quartz/quartz_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/rpcrt4/rpcrt4_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/rpcrt4/rpcrt4_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/rsaenh/rsaenh_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/rsaenh/rsaenh_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/scrrun/scrrun_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/scrrun/scrrun_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/urlmon/urlmon_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/urlmon/urlmon_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/user32/user32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/user32/user32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/ws2_32/ws2_32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/ws2_32/ws2_32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/advapi32/advapi32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/advapi32/advapi32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/browseui/browseui_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/browseui/browseui_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/comctl32/comctl32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/comctl32/comctl32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/crt/msvcrt_crt_dll_startup.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/crt/msvcrt_crt_dll_startup.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/dciman32/dciman32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/dciman32/dciman32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/iphlpapi/iphlpapi_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/iphlpapi/iphlpapi_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/kernel32/kernel32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/kernel32/kernel32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/localspl/localspl_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/localspl/localspl_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/netapi32/netapi32_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/netapi32/netapi32_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/netshell/netshell_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/netshell/netshell_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/powrprof/powrprof_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/powrprof/powrprof_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/setupapi/setupapi_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/setupapi/setupapi_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/winprint/winprint_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/winprint/winprint_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/winspool/winspool_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/winspool/winspool_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_io/iodeviceobject_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_io/iodeviceobject_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_mm/ntcreatesection_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_mm/ntcreatesection_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/tests/dllexport/dllexport_test_dll1.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/tests/dllexport/dllexport_test_dll1.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/tests/dllexport/dllexport_test_dll2.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/tests/dllexport/dllexport_test_dll2.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/win32/advapi32/eventlog/evtlogtest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/win32/advapi32/eventlog/evtlogtest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/advapi32/advapi32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/advapi32/advapi32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/advpack/advpack_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/advpack/advpack_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/amstream/amstream_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/amstream/amstream_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/avifil32/avifil32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/avifil32/avifil32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/browseui/browseui_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/browseui/browseui_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/cabinet/cabinet_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/cabinet/cabinet_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/comctl32/comctl32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/comctl32/comctl32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/comdlg32/comdlg32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/comdlg32/comdlg32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/crypt32/crypt32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/crypt32/crypt32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/cryptnet/cryptnet_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/cryptnet/cryptnet_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/cryptui/cryptui_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/cryptui/cryptui_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/devenum/devenum_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/devenum/devenum_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/dxdiagn/dxdiagn_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/dxdiagn/dxdiagn_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/faultrep/faultrep_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/faultrep/faultrep_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/gdiplus/gdiplus_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/gdiplus/gdiplus_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/hnetcfg/hnetcfg_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/hnetcfg/hnetcfg_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/imagehlp/imagehlp_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/imagehlp/imagehlp_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/inetcomm/inetcomm_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/inetcomm/inetcomm_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/inetmib1/inetmib1_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/inetmib1/inetmib1_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/iphlpapi/iphlpapi_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/iphlpapi/iphlpapi_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/jscript/jscript_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/jscript/jscript_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/kernel32/kernel32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/kernel32/kernel32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/localspl/localspl_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/localspl/localspl_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/localui/localui_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/localui/localui_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/mmdevapi/mmdevapi_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/mmdevapi/mmdevapi_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/msacm32/msacm32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/msacm32/msacm32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/mscoree/mscoree_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/mscoree/mscoree_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/msrle32/msrle32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/msrle32/msrle32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/msvcrtd/msvcrtd_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/msvcrtd/msvcrtd_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/msvfw32/msvfw32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/msvfw32/msvfw32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/netapi32/netapi32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/netapi32/netapi32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/netcfgx/netcfgx_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/netcfgx/netcfgx_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/ntdsapi/ntdsapi_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/ntdsapi/ntdsapi_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/odbccp32/odbccp32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/odbccp32/odbccp32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/oleaut32/oleaut32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/oleaut32/oleaut32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/opengl32/opengl32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/opengl32/opengl32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/propsys/propsys_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/propsys/propsys_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/rasapi32/rasapi32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/rasapi32/rasapi32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/regedit/regedit_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/regedit/regedit_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/riched20/riched20_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/riched20/riched20_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/riched32/riched32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/riched32/riched32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/schannel/schannel_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/schannel/schannel_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/secur32/secur32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/secur32/secur32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/serialui/serialui_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/serialui/serialui_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/services/services_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/services/services_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/setupapi/setupapi_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/setupapi/setupapi_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/shdocvw/shdocvw_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/shdocvw/shdocvw_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/shell32/shell32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/shell32/shell32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/shlwapi/shlwapi_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/shlwapi/shlwapi_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/snmpapi/snmpapi_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/snmpapi/snmpapi_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/spoolss/spoolss_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/spoolss/spoolss_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/twain_32/twain_32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/twain_32/twain_32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/userenv/userenv_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/userenv/userenv_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/uxtheme/uxtheme_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/uxtheme/uxtheme_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/vbscript/vbscript_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/vbscript/vbscript_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/version/version_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/version/version_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wbemdisp/wbemdisp_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wbemdisp/wbemdisp_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wbemprox/wbemprox_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wbemprox/wbemprox_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/winhttp/winhttp_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/winhttp/winhttp_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wininet/wininet_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wininet/wininet_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wintrust/wintrust_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wintrust/wintrust_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wldap32/wldap32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wldap32/wldap32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wmiutils/wmiutils_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wmiutils/wmiutils_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wmvcore/wmvcore_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wmvcore/wmvcore_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wscript/wscript_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wscript/wscript_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/wtsapi32/wtsapi32_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/wtsapi32/wtsapi32_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/xmllite/xmllite_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/xmllite/xmllite_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/localspl/dll/localspl_apitest.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/localspl/dll/localspl_apitest.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/win32/user32/paintdesktop/paintdesktop.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/win32/user32/paintdesktop/paintdesktop.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/xinput1_3/xinput1_3_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/xinput1_3/xinput1_3_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/kernel32/redirptest/redirtest1.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/kernel32/redirptest/redirtest1.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/kernel32/redirptest/redirtest2.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/kernel32/redirptest/redirtest2.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/msvcrt/CmdLineUtil/cmdlineutil.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/msvcrt/CmdLineUtil/cmdlineutil.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/win32u/win32u_xpsp2/win32u_xpsp2.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/win32u/win32u_xpsp2/win32u_xpsp2.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/fltmgr/fltmgr_load/fltmgrload_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/fltmgr/fltmgr_load/fltmgrload_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/win32/advapi32/eventlog/myeventprovider.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/win32/advapi32/eventlog/myeventprovider.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/win32u/win32u_2k3sp2/win32u_2k3sp2.dll: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/win32u/win32u_2k3sp2/win32u_2k3sp2.dll -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/fltmgr/fltmgr_create/fltmgr_create.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/fltmgr/fltmgr_create/fltmgr_create.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/win32/comctl32/buttonvistest/buttonvistest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/win32/comctl32/buttonvistest/buttonvistest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/apitests/user32_dynamic/user32_dynamic_apitest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/apitests/user32_dynamic/user32_dynamic_apitest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/fltmgr/fltmgr_register/fltmgrreg_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/fltmgr/fltmgr_register/fltmgrreg_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/windowscodecs/windowscodecs_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/windowscodecs/windowscodecs_winetest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_mm/mmmaplockedpagesspecifycache_drv.sys: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/kmtests/ntos_mm/mmmaplockedpagesspecifycache_drv.sys -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/win32/kernel32/notificationtest/notificationtest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/win32/kernel32/notificationtest/notificationtest.exe -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/unit_module_test/winetests/windowscodecsext/windowscodecsext_winetest.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/AlibabaOrionSecurityLab/TimePlayer/HEAD/TestCase/ReactOS0.4.9/unit_module_test/winetests/windowscodecsext/windowscodecsext_winetest.exe -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # TimePlayer 2 | 3 | This repository is comprised of RR logs, test cases, recorded program traces and tainting results, which be used to detect uninitialized variables leaks from Windows kernel through differential replay. 4 | The complete theory and method is available in our [paper](https://www.sigsac.org/ccs/CCS2019/) 5 | -------------------------------------------------------------------------------- /TestCase/ReactOS0.4.9/run_testcase.py: -------------------------------------------------------------------------------- 1 | import os 2 | import subprocess 3 | import re 4 | 5 | 6 | def run_exe(command): 7 | p = subprocess.Popen(command, stdout=subprocess.PIPE) 8 | output_re = '' 9 | 10 | while p.poll() is None: 11 | line = p.stdout.readline() 12 | output_re += line 13 | 14 | return output_re 15 | 16 | 17 | def get_result(output): 18 | case_re = re.compile(r'([0-9]+) tests executed') 19 | case_list = case_re.findall(output) 20 | 21 | if len(case_list) == 1: 22 | return int(case_list[0], 10) 23 | else: 24 | #print 'Error ', output 25 | return 0 26 | 27 | 28 | def run_path(full_path): 29 | case_num = 0 30 | 31 | print 'Start:', full_path 32 | 33 | output = run_exe(full_path) 34 | index = output.find('Valid test names') 35 | 36 | if index > 0: 37 | args = output[index:].split('\n')[1:] 38 | for arg in args: 39 | if len(arg.strip()) != 0: 40 | command = full_path.strip() + ' ' + arg.strip() 41 | output = run_exe(command) 42 | cur_num = get_result(output) 43 | case_num += cur_num 44 | print '\tSub: ' + arg + ' ' + str(cur_num) 45 | else: 46 | case_num += get_result(output) 47 | 48 | print 'Total:', case_num 49 | return case_num 50 | 51 | 52 | def main(): 53 | root_dir = r'.\unit_module_test' 54 | case_num = 0 55 | 56 | test_exe_list = [] 57 | 58 | for parents, dirnames, filenames in os.walk(root_dir): 59 | for filename in filenames: 60 | if filename.endswith('.exe'): 61 | full_path = os.path.join(parents, filename) 62 | test_exe_list.append(full_path) 63 | 64 | len_list = len(test_exe_list) 65 | 66 | for i in range(len_list): 67 | try: 68 | case_num += run_path(test_exe_list[i]) 69 | except: 70 | pass 71 | 72 | if (i+1) % 20 == 0: 73 | print 'Up to %d, Wating for pressing key.\n Total of total: %d' % (i, case_num) 74 | raw_input() 75 | 76 | print 'Finished! Total of total:', case_num 77 | 78 | 79 | if __name__ == "__main__": 80 | main() 81 | -------------------------------------------------------------------------------- /TaintLogDemo/taint_log_5ba46796.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | PyTaintAnalyser Taint Log 4 | 5 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | 167 | 168 | 169 | 170 | 171 | 172 | 173 | 174 | -------------------------------------------------------------------------------- /TaintLogDemo/taint_log_5bab6556.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | PyTaintAnalyser Taint Log 4 | 5 |
TypeTaintSrcTaintDstTaintExprTaintOper
Taint Memory/[0xa3c90008:0xa3c9002f]<BV320 TAINT_pool-hole_0_0_320>manually Code: 0x83d3ba97 pop ebp
rrid:0x2a90fa8cd real_id:0xa12ca2b7
UnTaint Memory/[0xa3c90008:0xa3c9000b]<BV32 0x6>Code: 0x83c405d5 mov dword ptr [ebx], eax
rrid:0x2a90fa8d6 real_id:0xa12ca2c0
UnTaint Memory/[0xa3c9000c:0xa3c9000f]<BV32 0x1>Code: 0x83c4060d mov dword ptr [ebx + 4], esi
rrid:0x2a90fcfb8 real_id:0xa12cc9a2
UnTaint Memory/[0xa3c90010:0xa3c90013]<BV32 0x515c31d8>Code: 0x83c40616 movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2a90fcfbb real_id:0xa12cc9a5
UnTaint Memory/[0xa3c90014:0xa3c90017]<BV32 0x163df734>Code: 0x83c40617 movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2a90fcfbc real_id:0xa12cc9a6
UnTaint Memory/[0xa3c90018:0xa3c9001b]<BV32 0xa011fda0>Code: 0x83c40618 movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2a90fcfbd real_id:0xa12cc9a7
UnTaint Memory/[0xa3c9001c:0xa3c9001f]<BV32 0xf1e8918c>Code: 0x83c40619 movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2a90fcfbe real_id:0xa12cc9a8
UnTaint Memory/[0xa3c90028:0xa3c9002b]<BV32 0x83d5b250>Code: 0x83c4da74 mov dword ptr [edi + ecx*4 - 4], eax
rrid:0x2a90fcfdb real_id:0xa12cc9c5
UnTaint Memory/[0xa3c90024:0xa3c90027]<BV32 0x4>Code: 0x83c40630 mov dword ptr [ebx + 0x1c], esi
rrid:0x2a90fcfe7 real_id:0xa12cc9d1
UnTaint Memory/[0xa3c90020:0xa3c90023]<BV32 0x0>Code: 0x83c40639 mov dword ptr [ebx + 0x18], eax
rrid:0x2a90fcfea real_id:0xa12cc9d4
Taint Memory[0xa3c90008:0xa3c9002f]
[0x8e82ca7c:0x8e82caa3]<BV320 0x600000001000000d8315c5134f73d16a0fd11a08c91e8f1000000000400000050b2d583#288 .. TAINT_pool-hole_0_0_320[31:0]>Code: 0x83c4d973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2a90fd0c4 real_id:0xa12cca25
Taint Memory[0x8e82ca7c:0x8e82caa3]
[0xa9f82f00:0xa9f82f27]<BV320 0x600000001000000d8315c5134f73d16a0fd11a08c91e8f1000000000400000050b2d583#288 .. TAINT_pool-hole_0_0_320[31:0]>Code: 0x83c4d973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2a90fd967 real_id:0xa12cd259
Taint Memory[0xa9f82f00:0xa9f82f27]
[0xebd378:0xebd39f]<BV320 0x600000001000000d8315c5134f73d16a0fd11a08c91e8f1000000000400000050b2d583#288 .. TAINT_pool-hole_0_0_320[31:0]>Code: 0x83c4d973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2a91a4bb1 real_id:0xa12cec21
62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | -------------------------------------------------------------------------------- /TaintLogDemo/taint_log_5bcc92d3.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | PyTaintAnalyser Taint Log 4 | 5 |
TypeTaintSrcTaintDstTaintExprTaintOper
Taint Memory/[0xa6c44000:0xa6c44fff]<BV32768 TAINT_pool-hole_0_0_512 .. TAINT_pool-hole_64_1_512 .. TAINT_pool-hole_128_2_512 .. TAINT_pool-hole_192_3_512 .. TAINT_pool-hole_256_4_512 .. TAINT_pool-hole_320_5_512 .. TAINT_pool-hole_384_6_512 .. TAINT_pool-hole_448_7_512 .. TAINT_pool-hole_512_8_512 .. TAINT_pool-hole_576_9_512 .. TAINT_pool-hole_640_10_512 .. TAINT_pool-hole_704_11_512 .. TAINT_pool-hole_768_12_512 .. TAINT_pool-hole_832_13_512 .. TAINT_pool-hole_896_14_512 .. TAINT_pool-hole_960_15_512 .. TAINT_pool-hole_1024_16_512 .. TAINT_pool-hole_1088_17_512 .. TAINT_pool-hole_1152_18_512 .. TAINT_pool-hole_1216_19_512 .. TAINT_pool-hole_1280_20_512 .. TAINT_pool-hole_1344_21_512 .. TAINT_pool-hole_1408_22_512 .. TAINT_pool-hole_1472_23_512 .. TAINT_pool-hole_1536_24_512 .. TAINT_pool-hole_1600_25_512 .. TAINT_pool-hole_1664_26_512 .. TAINT_pool-hole_1728_27_512 .. TAINT_pool-hole_1792_28_512 .. TAINT_pool-hole_1856_29_512 .. TAINT_pool-hole_1920_30_512 .. TAINT_pool-hole_1984_31_512 .. TAINT_pool-hole_2048_32_512 .. TAINT_pool-hole_2112_33_512 .. TAINT_pool-hole_2176_34_512 .. TAINT_pool-hole_2240_35_512 .. TAINT_pool-hole_2304_36_512 .. TAINT_pool-hole_2368_37_512 .. TAINT_pool-hole_2432_38_512 .. TAINT_pool-hole_2496_39_512 .. TAINT_pool-hole_2560_40_512 .. TAINT_pool-hole_2624_41_512 .. TAINT_pool-hole_2688_42_512 .. TAINT_pool-hole_2752_43_512 .. TAINT_pool-hole_2816_44_512 .. TAINT_pool-hole_2880_45_512 .. TAINT_pool-hole_2944_46_512 .. TAINT_pool-hole_3008_47_512 .. TAINT_pool-hole_3072_48_512 .. TAINT_pool-hole_3136_49_512 .. TAINT_pool-hole_3200_50_512 .. TAINT_pool-hole_3264_51_512 .. TAINT_pool-hole_3328_52_512 .. TAINT_pool-hole_3392_53_512 .. TAINT_pool-hole_3456_54_512 .. TAINT_pool-hole_3520_55_512 .. TAINT_pool-hole_3584_56_512 .. TAINT_pool-hole_3648_57_512 .. TAINT_pool-hole_3712_58_512 .. TAINT_pool-hole_3776_59_512 .. TAINT_pool-hole_3840_60_512 .. TAINT_pool-hole_3904_61_512 .. TAINT_pool-hole_3968_62_512 .. TAINT_pool-hole_4032_63_512>manually Code: 0x83d38a97 pop ebp
rrid:0x2f5bcc380 real_id:0x2e5ff4246
UnTaint Memory/[0xa6c44000:0xa6c44017]<BV192 0x3c005400020000005401000034090000a003000073520500>Code: 0x83e86b1e rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2f5bcc839 real_id:0x2e5ff46eb
UnTaint Memory/[0xa6c44018:0xa6c44053]<BV480 0x30000000000000000000000710100000000000000000000000000000000000034f3110040ef1400fe84c876304d1700000000000000000000000000>Code: 0x83c4a973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2f5bcc87a real_id:0x2e5ff471d
UnTaint Memory/[0xa6c44058:0xa6c4405b]<BV32 0x1>Code: 0x8a573130 mov dword ptr [eax], edx
rrid:0x2fb8df569 real_id:0x2ebb82746
UnTaint Memory/[0xa6c4405c:0xa6c4405f]<BV32 0x7>Code: 0x8a573130 mov dword ptr [eax], edx
rrid:0x2fb8df58c real_id:0x2ebb82769
UnTaint Memory/[0xa6c44060:0xa6c44063]<BV32 0x0>Code: 0x8a573130 mov dword ptr [eax], edx
rrid:0x2fb8df5af real_id:0x2ebb8278c
Taint Memory[0xa6c44018:0xa6c44063]
[0x90c45700:0x90c4574b]<BV608 0x7401000000000000000000000000000000000000000000000000000000000000740069006d00650070006c0061007900#480 .. TAINT_pool-hole_64_1_512[351:320] .. 0x10000000700000000000000#96>Code: 0x83c4a973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2fb8dff8b real_id:0x2ebb830ff
Taint Memory[0x90c45700:0x90c4574b]
[0x1313b8:0x131403]<BV608 0x7401000000000000000000000000000000000000000000000000000000000000740069006d00650070006c0061007900#480 .. TAINT_pool-hole_64_1_512[351:320] .. 0x10000000700000000000000#96>Code: 0x83c4a973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x2fc379a59 real_id:0x2ec5e22bc
62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | 167 | 168 | 169 | 170 | 171 | 172 | 173 | 174 | 175 | 176 | 177 | 178 | 179 | 180 | 181 | 182 | -------------------------------------------------------------------------------- /TaintLogDemo/taint_log_5b7f7195.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | PyTaintAnalyser Taint Log 4 | 5 |
TypeTaintSrcTaintDstTaintExprTaintOper
Taint Memory/[0x86fdc900:0x86fdcb2c]<BV4456 TAINT_pool-hole_0_0_512 .. TAINT_pool-hole_64_1_512 .. TAINT_pool-hole_128_2_512 .. TAINT_pool-hole_192_3_512 .. TAINT_pool-hole_256_4_512 .. TAINT_pool-hole_320_5_512 .. TAINT_pool-hole_384_6_512 .. TAINT_pool-hole_448_7_512 .. TAINT_pool-hole_512_8_360>manually Code: 0x83d6da97 pop ebp
rrid:0x41dfdd1b9 real_id:0x403efe9ab
UnTaint Memory/[0x86fdc900:0x86fdc93b]<BV480 0x1c000000534353494449534b3c00000001051b00000000001102000000020000000101000000ec000000000000000000000000000000000000000000>Code: 0x83c7f973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdd1e5 real_id:0x403efe9c9
Taint Memory[0x86fdc900:0x86fdc9ff]
[0x86fdca00:0x86fdcaff]
[0x86fdcb00:0x86fdcb2b]
[0x86fdcb50:0x86fdcc4f]<BV2048 0x1c000000534353494449534b3c00000001051b00000000001102000000020000000001000000ec00000000004000ff3f00001000007e00023f000000#480 .. TAINT_pool-hole_0_0_512[31:0] .. TAINT_pool-hole_64_1_512 .. TAINT_pool-hole_128_2_512 .. TAINT_pool-hole_192_3_512>Code: 0x83c7f973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdf328 real_id:0x403f00851
Taint Memory[0x86fdc900:0x86fdc9ff]
[0x86fdca00:0x86fdcaff]
[0x86fdcb00:0x86fdcb2b]
[0x86fdcc50:0x86fdcd4f]<BV2048 TAINT_pool-hole_256_4_512 .. TAINT_pool-hole_320_5_512 .. TAINT_pool-hole_384_6_512 .. TAINT_pool-hole_448_7_512>Code: 0x83c7f973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdf328 real_id:0x403f00851
Taint Memory[0x86fdc900:0x86fdc9ff]
[0x86fdca00:0x86fdcaff]
[0x86fdcb00:0x86fdcb2b]
[0x86fdcd50:0x86fdcd7b]<BV352 TAINT_pool-hole_512_8_360[359:8]>Code: 0x83c7f973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdf328 real_id:0x403f00851
Taint Reg[0x86fdcb2c:0x86fdcb2c]
al<BV8 TAINT_pool-hole_512_8_360[7:0]>Code: 0x83c7faa4 mov al, byte ptr [esi]
rrid:0x41dfdf32b real_id:0x403f00853
Taint Memoryal
[0x86fdcd7c:0x86fdcd7c]<BV8 TAINT_pool-hole_512_8_360[7:0]>Code: 0x83c7faa6 mov byte ptr [edi], al
rrid:0x41dfdf32c real_id:0x403f00854
UnTaint Reg/eax<BV32 0x31fb91c4>Code: 0x83c7faa8 mov eax, dword ptr [ebp + 8]
rrid:0x41dfdf32d real_id:0x403f00855
Taint Memory[0x86fdcb6c:0x86fdcc6b]
[0x86fdcc6c:0x86fdcd6b]
[0x86fdcd6c:0x86fdcd7b]
[0x86fdcdc0:0x86fdcebf]<BV2048 0x20000000001000000ec00000000004000ff3f00001000007e00023f000000#256 .. TAINT_pool-hole_0_0_512[31:0] .. TAINT_pool-hole_64_1_512 .. TAINT_pool-hole_128_2_512 .. TAINT_pool-hole_192_3_512 .. TAINT_pool-hole_256_4_512[511:288]>Code: 0x83c7fcb3 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdf6e9 real_id:0x403f00b8e
Taint Memory[0x86fdcb6c:0x86fdcc6b]
[0x86fdcc6c:0x86fdcd6b]
[0x86fdcd6c:0x86fdcd7b]
[0x86fdcec0:0x86fdcfbf]<BV2048 TAINT_pool-hole_256_4_512[287:0] .. TAINT_pool-hole_320_5_512 .. TAINT_pool-hole_384_6_512 .. TAINT_pool-hole_448_7_512 .. TAINT_pool-hole_512_8_360[359:136]>Code: 0x83c7fcb3 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdf6e9 real_id:0x403f00b8e
Taint Memory[0x86fdcb6c:0x86fdcc6b]
[0x86fdcc6c:0x86fdcd6b]
[0x86fdcd6c:0x86fdcd7b]
[0x86fdcfc0:0x86fdcfcf]<BV128 TAINT_pool-hole_512_8_360[135:8]>Code: 0x83c7fcb3 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdf6e9 real_id:0x403f00b8e
Taint Memory[0x86fdcdc0:0x86fdcebf]
[0x86fdcec0:0x86fdcfbf]
[0x86fdcfc0:0x86fdcfcf]
[0xd5e368:0xd5e467]<BV2048 0x20000000001000000ec00000000004000ff3f00001000007e00023f000000#256 .. TAINT_pool-hole_0_0_512[31:0] .. TAINT_pool-hole_64_1_512 .. TAINT_pool-hole_128_2_512 .. TAINT_pool-hole_192_3_512 .. TAINT_pool-hole_256_4_512[511:288]>Code: 0x83c7f973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdf9fa real_id:0x403f00e1b
Taint Memory[0x86fdcdc0:0x86fdcebf]
[0x86fdcec0:0x86fdcfbf]
[0x86fdcfc0:0x86fdcfcf]
[0xd5e468:0xd5e567]<BV2048 TAINT_pool-hole_256_4_512[287:0] .. TAINT_pool-hole_320_5_512 .. TAINT_pool-hole_384_6_512 .. TAINT_pool-hole_448_7_512 .. TAINT_pool-hole_512_8_360[359:136]>Code: 0x83c7f973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdf9fa real_id:0x403f00e1b
Taint Memory[0x86fdcdc0:0x86fdcebf]
[0x86fdcec0:0x86fdcfbf]
[0x86fdcfc0:0x86fdcfcf]
[0xd5e568:0xd5e577]<BV128 TAINT_pool-hole_512_8_360[135:8]>Code: 0x83c7f973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x41dfdf9fa real_id:0x403f00e1b
62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | 167 | 168 | 169 | 170 | 171 | 172 | 173 | 174 | 175 | 176 | 177 | 178 | 179 | 180 | 181 | 182 | 183 | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 | 192 | 193 | 194 | 195 | 196 | 197 | 198 | 199 | 200 | 201 | 202 | 203 | 204 | 205 | 206 | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 | 240 | 241 | 242 | 243 | 244 | 245 | 246 | -------------------------------------------------------------------------------- /TaintLogDemo/taint_log_5b8ba9b1.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | PyTaintAnalyser Taint Log 4 | 5 |
TypeTaintSrcTaintDstTaintExprTaintOper
Taint Memory/[0x9c233d34:0x9c233d7b]<BV576 TAINT_stackhole_0_0_512 .. TAINT_stackhole_64_1_64>manually Code: 0x83c4f350 sub esp, 0x48
rrid:0x37698e10c real_id:0x1178959
UnTaint Memory/[0x9c233d78:0x9c233d7b]<BV32 0x143>Code: 0x83c4f38c mov dword ptr [ebp + 0x44], eax
rrid:0x37698e113 real_id:0x1178960
UnTaint Memory/[0x9c233d70:0x9c233d73]<BV32 0x16fff70>Code: 0x83c4f38f mov dword ptr [ebp + 0x3c], edx
rrid:0x37698e114 real_id:0x1178961
UnTaint Memory/[0x9c233d60:0x9c233d63]<BV32 0x0>Code: 0x83c4f512 and dword ptr [ebp + 0x2c], 0
rrid:0x37698e124 real_id:0x1178971
UnTaint Memory/[0x9c233d40:0x9c233d43]<BV32 0x16fff70>Code: 0x83c4f52c mov dword ptr [ebp + 0xc], edx
rrid:0x37698e12a real_id:0x1178977
UnTaint Memory/[0x9c233d3c:0x9c233d3f]<BV32 0xbadb0d00>Code: 0x83c4f52f mov dword ptr [ebp + 8], 0xbadb0d00
rrid:0x37698e12b real_id:0x1178978
UnTaint Memory/[0x9c233d34:0x9c233d37]<BV32 0x16fff78>Code: 0x83c4f536 mov dword ptr [ebp], ebx
rrid:0x37698e12c real_id:0x1178979
UnTaint Memory/[0x9c233d38:0x9c233d3b]<BV32 0x77296bb4>Code: 0x83c4f539 mov dword ptr [ebp + 4], edi
rrid:0x37698e12d real_id:0x117897a
UnTaint Memory/[0x9c233d46:0x9c233d46]<BV8 0>Code: 0x83c4f5d8 setne byte ptr [ebp + 0x12]
rrid:0x37698e420 real_id:0x1178c6b
Taint Reg[0x9c233d64:0x9c233d65]
eax<BV32 0x0#16 .. TAINT_stackhole_0_0_512[119:112] .. TAINT_stackhole_0_0_512[127:120]>Code: 0x83cc5674 movzx eax, word ptr [edi + 0x30]
rrid:0x37698fe7f real_id:0x117a5f9
Taint Memoryeax
[0x8ea9a9dc:0x8ea9a9df]<BV32 0x0#16 .. TAINT_stackhole_0_0_512[119:112] .. TAINT_stackhole_0_0_512[127:120]>Code: 0x83cc5678 mov dword ptr [esi + 0x8c], eax
rrid:0x37698fe80 real_id:0x117a5fa
UnTaint Reg/eax<BV32 0x3b>Code: 0x83cc567e movzx eax, word ptr [edi + 0x50]
rrid:0x37698fe81 real_id:0x117a5fb
Taint Reg[0x9c233d68:0x9c233d69]
eax<BV32 0x0#16 .. TAINT_stackhole_0_0_512[87:80] .. TAINT_stackhole_0_0_512[95:88]>Code: 0x83cc5688 movzx eax, word ptr [edi + 0x34]
rrid:0x37698fe83 real_id:0x117a5fd
Taint Memoryeax
[0x8ea9a9e4:0x8ea9a9e7]<BV32 0x0#16 .. TAINT_stackhole_0_0_512[87:80] .. TAINT_stackhole_0_0_512[95:88]>Code: 0x83cc568c mov dword ptr [esi + 0x94], eax
rrid:0x37698fe84 real_id:0x117a5fe
ReTaint Reg[0x9c233d6c:0x9c233d6d]
eax<BV32 0x0#16 .. TAINT_stackhole_0_0_512[55:48] .. TAINT_stackhole_0_0_512[63:56]>Code: 0x83cc5692 movzx eax, word ptr [edi + 0x38]
rrid:0x37698fe85 real_id:0x117a5ff
Taint Memoryeax
[0x8ea9a9e8:0x8ea9a9eb]<BV32 0x0#16 .. TAINT_stackhole_0_0_512[55:48] .. TAINT_stackhole_0_0_512[63:56]>Code: 0x83cc5696 mov dword ptr [esi + 0x98], eax
rrid:0x37698fe86 real_id:0x117a600
UnTaint Reg/eax<BV32 0x10002>Code: 0x83cc569c mov eax, 0x10002
rrid:0x37698fe87 real_id:0x117a601
Taint Reg[0x9c233d74:0x9c233d77]
eax<BV32 TAINT_stackhole_64_1_64[39:32] .. TAINT_stackhole_64_1_64[47:40] .. TAINT_stackhole_64_1_64[55:48] .. TAINT_stackhole_64_1_64[63:56]>Code: 0x83cc56c4 mov eax, dword ptr [edi + 0x40]
rrid:0x37698fe92 real_id:0x117a60c
Taint Memoryeax
[0x8ea9a9fc:0x8ea9a9ff]<BV32 TAINT_stackhole_64_1_64[39:32] .. TAINT_stackhole_64_1_64[47:40] .. TAINT_stackhole_64_1_64[55:48] .. TAINT_stackhole_64_1_64[63:56]>Code: 0x83cc56c7 mov dword ptr [esi + 0xac], eax
rrid:0x37698fe93 real_id:0x117a60d
UnTaint Reg/eax<BV32 0x16fff70>Code: 0x83cc56cd mov eax, dword ptr [edi + 0x3c]
rrid:0x37698fe94 real_id:0x117a60e
Taint Reg[0x8ea9a9fc:0x8ea9a9ff]
ecx<BV32 TAINT_stackhole_64_1_64[39:32] .. TAINT_stackhole_64_1_64[47:40] .. TAINT_stackhole_64_1_64[55:48] .. TAINT_stackhole_64_1_64[63:56]>Code: 0x83c93030 mov ecx, dword ptr [eax + 0xac]
rrid:0x376990296 real_id:0x117aa10
Taint Memoryecx
[0x22fb40:0x22fb43]<BV32 TAINT_stackhole_64_1_64[39:32] .. TAINT_stackhole_64_1_64[47:40] .. TAINT_stackhole_64_1_64[55:48] .. TAINT_stackhole_64_1_64[63:56]>Code: 0x83c93036 mov dword ptr [edx + 0xac], ecx
rrid:0x376990297 real_id:0x117aa11
62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | 167 | 168 | 169 | 170 | 171 | 172 | 173 | 174 | 175 | 176 | 177 | 178 | 179 | 180 | 181 | 182 | 183 | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 | 192 | 193 | 194 | 195 | 196 | 197 | 198 | 199 | 200 | 201 | 202 | 203 | 204 | 205 | 206 | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 | 240 | 241 | 242 | 243 | 244 | 245 | 246 | 247 | 248 | 249 | 250 | 251 | 252 | 253 | 254 | 255 | 256 | 257 | 258 | 259 | 260 | 261 | 262 | 263 | 264 | 265 | 266 | 267 | 268 | 269 | 270 | -------------------------------------------------------------------------------- /DifferentReplayLogDemo/different_replay_3.log: -------------------------------------------------------------------------------- 1 | ------Difference Found!------ 2 | ----padding history---- 3 | padding,rrid:5464912057,pc:83c94c5e, sp:96bf4408,len:16 4 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 368, pname: csrss.exe 5 | 6 | padding,rrid:5464912394,pc:83c74838, sp:96bf447c,len:16 7 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 8 | 9 | padding,rrid:5464912566,pc:83c74838, sp:96bf4470,len:24 10 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 11 | 12 | padding,rrid:5464912872,pc:83d3b010, sp:96bf43fc,len:60 13 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 14 | 15 | padding,rrid:5464913074,pc:83c94c5e, sp:96bf4408,len:16 16 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 368, pname: csrss.exe 17 | 18 | padding,rrid:5464913403,pc:83c74838, sp:96bf447c,len:16 19 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 20 | 21 | padding,rrid:5464913575,pc:83c74838, sp:96bf4470,len:24 22 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 23 | 24 | padding,rrid:5464913911,pc:83d3b010, sp:96bf43fc,len:60 25 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 26 | 27 | padding,rrid:5464914113,pc:83c94c5e, sp:96bf4408,len:16 28 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 368, pname: csrss.exe 29 | 30 | padding,rrid:5464914446,pc:83c74838, sp:96bf447c,len:16 31 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 32 | 33 | padding,rrid:5464914618,pc:83c74838, sp:96bf4470,len:24 34 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 35 | 36 | padding,rrid:5464914991,pc:83d3b010, sp:96bf43fc,len:60 37 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 38 | 39 | padding,rrid:5464915193,pc:83c94c5e, sp:96bf4408,len:16 40 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 368, pname: csrss.exe 41 | 42 | padding,rrid:5464915524,pc:83c74838, sp:96bf447c,len:16 43 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 44 | 45 | padding,rrid:5464915696,pc:83c74838, sp:96bf4470,len:24 46 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 47 | 48 | padding,rrid:5464916002,pc:83d3b010, sp:96bf43fc,len:60 49 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 50 | 51 | padding,rrid:5464916204,pc:83c94c5e, sp:96bf4408,len:16 52 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 368, pname: csrss.exe 53 | 54 | padding,rrid:5464916533,pc:83c74838, sp:96bf447c,len:16 55 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 56 | 57 | padding,rrid:5464916705,pc:83c74838, sp:96bf4470,len:24 58 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 59 | 60 | padding,rrid:5464917041,pc:83d3b010, sp:96bf43fc,len:60 61 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 62 | 63 | padding,rrid:5464917243,pc:83c94c5e, sp:96bf4408,len:16 64 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 368, pname: csrss.exe 65 | 66 | padding,rrid:5464917576,pc:83c74838, sp:96bf447c,len:16 67 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 68 | 69 | padding,rrid:5464917748,pc:83c74838, sp:96bf4470,len:24 70 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 71 | 72 | padding,rrid:5464918108,pc:83d3b010, sp:96bf43fc,len:60 73 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 74 | 75 | padding,rrid:5464918310,pc:83c94c5e, sp:96bf4408,len:16 76 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 368, pname: csrss.exe 77 | 78 | padding,rrid:5464918641,pc:83c74838, sp:96bf447c,len:16 79 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 80 | 81 | padding,rrid:5464918813,pc:83c74838, sp:96bf4470,len:24 82 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 83 | 84 | padding,rrid:5464919471,pc:83d3b010, sp:96bf43fc,len:60 85 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 86 | 87 | padding,rrid:5464919673,pc:83c94c5e, sp:96bf4408,len:16 88 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 368, pname: csrss.exe 89 | 90 | padding,rrid:5464920003,pc:83c74838, sp:96bf447c,len:16 91 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 92 | 93 | padding,rrid:5464920175,pc:83c74838, sp:96bf4470,len:24 94 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 95 | 96 | padding,rrid:5464920775,pc:83d3b010, sp:96bf43fc,len:60 97 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 98 | 99 | padding,rrid:5464920977,pc:83c94c5e, sp:96bf4408,len:16 100 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 368, pname: csrss.exe 101 | 102 | padding,rrid:5464921316,pc:83c74838, sp:96bf447c,len:16 103 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 104 | 105 | padding,rrid:5464921492,pc:940f8915, sp:96bf4424,len:148 106 | pc:940f8915 in module: \SystemRoot\System32\win32k.sys, base: 940f0000, offset: 00008915, pid: 368, pname: csrss.exe 107 | 108 | padding,rrid:5464921535,pc:83c520b2, sp:96bf438c,len:72 109 | pc:83c520b2 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000350b2, pid: 368, pname: csrss.exe 110 | 111 | padding,rrid:5464921577,pc:83c52592, sp:96bf4378,len:20 112 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 368, pname: csrss.exe 113 | 114 | padding,rrid:5464922276,pc:83c74838, sp:96bf431c,len:28 115 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 116 | 117 | padding,rrid:5464922316,pc:83e76929, sp:96bf42d4,len:12 118 | pc:83e76929 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00259929, pid: 368, pname: csrss.exe 119 | 120 | padding,rrid:5464922369,pc:83c74838, sp:96bf427c,len:28 121 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 122 | 123 | padding,rrid:5464922512,pc:83e4185a, sp:96bf4298,len:20 124 | pc:83e4185a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0022485a, pid: 368, pname: csrss.exe 125 | 126 | padding,rrid:5464922574,pc:83d3b00a, sp:96bf4278,len:4 127 | pc:83d3b00a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e00a, pid: 368, pname: csrss.exe 128 | 129 | padding,rrid:5464922576,pc:83d3b010, sp:96bf423c,len:60 130 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 131 | 132 | padding,rrid:5464922882,pc:83e2c400, sp:96bf416c,len:356 133 | pc:83e2c400 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0020f400, pid: 368, pname: csrss.exe 134 | 135 | padding,rrid:5464922940,pc:83e3479f, sp:96bf40f4,len:60 136 | pc:83e3479f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0021779f, pid: 368, pname: csrss.exe 137 | 138 | padding,rrid:5464922982,pc:83e22ec7, sp:96bf40c0,len:4 139 | pc:83e22ec7 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00205ec7, pid: 368, pname: csrss.exe 140 | 141 | padding,rrid:5464922983,pc:83e22eca, sp:96bf4094,len:44 142 | pc:83e22eca in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00205eca, pid: 368, pname: csrss.exe 143 | 144 | padding,rrid:5464923529,pc:83e1dbfe, sp:96bf43d0,len:4 145 | pc:83e1dbfe in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200bfe, pid: 368, pname: csrss.exe 146 | 147 | padding,rrid:5464923530,pc:83e1dc01, sp:96bf43b4,len:28 148 | pc:83e1dc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200c01, pid: 368, pname: csrss.exe 149 | 150 | padding,rrid:5464923700,pc:83c520b2, sp:96bf439c,len:72 151 | pc:83c520b2 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000350b2, pid: 368, pname: csrss.exe 152 | 153 | padding,rrid:5464923742,pc:83c52592, sp:96bf4398,len:4 154 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 368, pname: csrss.exe 155 | 156 | padding,rrid:5464924588,pc:83e3c1bf, sp:96bf4340,len:4 157 | pc:83e3c1bf in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0021f1bf, pid: 368, pname: csrss.exe 158 | 159 | padding,rrid:5464924589,pc:83e3c1c2, sp:96bf4314,len:44 160 | pc:83e3c1c2 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0021f1c2, pid: 368, pname: csrss.exe 161 | 162 | padding,rrid:5464924703,pc:83e7603f, sp:96bf42f8,len:4 163 | pc:83e7603f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0025903f, pid: 368, pname: csrss.exe 164 | 165 | padding,rrid:5464924704,pc:83e76042, sp:96bf42d0,len:40 166 | pc:83e76042 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00259042, pid: 368, pname: csrss.exe 167 | 168 | padding,rrid:5464924727,pc:83e6797e, sp:96bf42a4,len:24 169 | pc:83e6797e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0024a97e, pid: 368, pname: csrss.exe 170 | 171 | padding,rrid:5464924910,pc:83c520b2, sp:96bf438c,len:72 172 | pc:83c520b2 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000350b2, pid: 368, pname: csrss.exe 173 | 174 | padding,rrid:5464924952,pc:83c52592, sp:96bf4378,len:20 175 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 368, pname: csrss.exe 176 | 177 | padding,rrid:5464925651,pc:83c74838, sp:96bf431c,len:28 178 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 179 | 180 | padding,rrid:5464925691,pc:83e76929, sp:96bf42d4,len:12 181 | pc:83e76929 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00259929, pid: 368, pname: csrss.exe 182 | 183 | padding,rrid:5464925744,pc:83c74838, sp:96bf427c,len:28 184 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 185 | 186 | padding,rrid:5464925887,pc:83e4185a, sp:96bf4298,len:20 187 | pc:83e4185a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0022485a, pid: 368, pname: csrss.exe 188 | 189 | padding,rrid:5464925949,pc:83d3b00a, sp:96bf4278,len:4 190 | pc:83d3b00a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e00a, pid: 368, pname: csrss.exe 191 | 192 | padding,rrid:5464925951,pc:83d3b010, sp:96bf423c,len:60 193 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 368, pname: csrss.exe 194 | 195 | padding,rrid:5464926257,pc:83e2c400, sp:96bf416c,len:356 196 | pc:83e2c400 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0020f400, pid: 368, pname: csrss.exe 197 | 198 | padding,rrid:5464926315,pc:83e3479f, sp:96bf40f4,len:60 199 | pc:83e3479f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0021779f, pid: 368, pname: csrss.exe 200 | 201 | padding,rrid:5464926357,pc:83e22ec7, sp:96bf40c0,len:4 202 | pc:83e22ec7 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00205ec7, pid: 368, pname: csrss.exe 203 | 204 | padding,rrid:5464926358,pc:83e22eca, sp:96bf4094,len:44 205 | pc:83e22eca in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00205eca, pid: 368, pname: csrss.exe 206 | 207 | padding,rrid:5464926904,pc:83e1dbfe, sp:96bf43d0,len:4 208 | pc:83e1dbfe in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200bfe, pid: 368, pname: csrss.exe 209 | 210 | padding,rrid:5464926905,pc:83e1dc01, sp:96bf43b4,len:28 211 | pc:83e1dc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200c01, pid: 368, pname: csrss.exe 212 | 213 | padding,rrid:5464927075,pc:83c520b2, sp:96bf439c,len:72 214 | pc:83c520b2 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000350b2, pid: 368, pname: csrss.exe 215 | 216 | padding,rrid:5464927117,pc:83c52592, sp:96bf4398,len:4 217 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 368, pname: csrss.exe 218 | 219 | padding,rrid:5464927963,pc:83e3c1bf, sp:96bf4340,len:4 220 | pc:83e3c1bf in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0021f1bf, pid: 368, pname: csrss.exe 221 | 222 | padding,rrid:5464927964,pc:83e3c1c2, sp:96bf4314,len:44 223 | pc:83e3c1c2 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0021f1c2, pid: 368, pname: csrss.exe 224 | 225 | padding,rrid:5464928078,pc:83e7603f, sp:96bf42f8,len:4 226 | pc:83e7603f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0025903f, pid: 368, pname: csrss.exe 227 | 228 | padding,rrid:5464928079,pc:83e76042, sp:96bf42d0,len:40 229 | pc:83e76042 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00259042, pid: 368, pname: csrss.exe 230 | 231 | padding,rrid:5464928102,pc:83e6797e, sp:96bf42a4,len:24 232 | pc:83e6797e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0024a97e, pid: 368, pname: csrss.exe 233 | 234 | padding,rrid:5464928318,pc:83c78909, sp:96bf4400,len:4 235 | pc:83c78909 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005b909, pid: 368, pname: csrss.exe 236 | 237 | padding,rrid:5464928319,pc:83c7890c, sp:96bf43dc,len:36 238 | pc:83c7890c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005b90c, pid: 368, pname: csrss.exe 239 | 240 | padding,rrid:5464928418,pc:840310e3, sp:96bf43a8,len:12 241 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 368, pname: csrss.exe 242 | 243 | padding,rrid:5464928515,pc:83c74838, sp:96bf43c8,len:12 244 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 245 | 246 | padding,rrid:5464928557,pc:83c74838, sp:96bf4320,len:88 247 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 248 | 249 | padding,rrid:5464928623,pc:83c74838, sp:96bf4288,len:96 250 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 251 | 252 | padding,rrid:5464929031,pc:83e92113, sp:96bf4254,len:28 253 | pc:83e92113 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00275113, pid: 368, pname: csrss.exe 254 | 255 | padding,rrid:5464929249,pc:83e26ab8, sp:96bf420c,len:48 256 | pc:83e26ab8 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00209ab8, pid: 368, pname: csrss.exe 257 | 258 | padding,rrid:5464929283,pc:83c74838, sp:96bf41dc,len:8 259 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 368, pname: csrss.exe 260 | 261 | padding,rrid:5464929308,pc:83e41c49, sp:96bf41b0,len:12 262 | pc:83e41c49 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00224c49, pid: 368, pname: csrss.exe 263 | 264 | padding,rrid:5464929711,pc:83c76d11, sp:96bf4250,len:28 265 | pc:83c76d11 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00059d11, pid: 368, pname: csrss.exe 266 | 267 | padding,rrid:5464929824,pc:83c7532c, sp:96bf4280,len:4 268 | pc:83c7532c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005832c, pid: 368, pname: csrss.exe 269 | 270 | padding,rrid:5464929825,pc:83c7532f, sp:96bf4264,len:28 271 | pc:83c7532f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005832f, pid: 368, pname: csrss.exe 272 | 273 | padding,rrid:5464929898,pc:83c7a457, sp:96bf4210,len:4 274 | pc:83c7a457 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005d457, pid: 368, pname: csrss.exe 275 | 276 | padding,rrid:5464929899,pc:83c7a45a, sp:96bf41ac,len:100 277 | pc:83c7a45a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005d45a, pid: 368, pname: csrss.exe 278 | 279 | padding,rrid:5464930153,pc:83c74ae1, sp:96bf42a8,len:4 280 | pc:83c74ae1 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057ae1, pid: 368, pname: csrss.exe 281 | 282 | padding,rrid:5464930154,pc:83c74ae4, sp:96bf4254,len:84 283 | pc:83c74ae4 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057ae4, pid: 368, pname: csrss.exe 284 | 285 | padding,rrid:5464930244,pc:83c7b3fc, sp:96bf421c,len:20 286 | pc:83c7b3fc in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005e3fc, pid: 368, pname: csrss.exe 287 | 288 | padding,rrid:5464930296,pc:83c7c517, sp:96bf41e4,len:36 289 | pc:83c7c517 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f517, pid: 368, pname: csrss.exe 290 | 291 | padding,rrid:5464930348,pc:83c7c91e, sp:96bf41c8,len:4 292 | pc:83c7c91e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f91e, pid: 368, pname: csrss.exe 293 | 294 | padding,rrid:5464930349,pc:83c7c921, sp:96bf41ac,len:28 295 | pc:83c7c921 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f921, pid: 368, pname: csrss.exe 296 | 297 | padding,rrid:5464930387,pc:83c754e0, sp:96bf41c4,len:16 298 | pc:83c754e0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000584e0, pid: 368, pname: csrss.exe 299 | 300 | padding,rrid:5464930531,pc:840310e3, sp:96a54b04,len:12 301 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 368, pname: csrss.exe 302 | 303 | ----[A]----: 304 | rr_icount:5464930705 305 | pc:83c4d973 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00030973, pid: 368, pname: csrss.exe 306 | addr1:0a19fe5c value:d8 a5 e7 a3 00 00 00 00 addr2:9675cad0 value:d8 a5 e7 a3 00 00 00 00 307 | ----[B]----: 308 | rr_icount:5464930705 309 | pc:83c4d973 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00030973, pid: 368, pname: csrss.exe 310 | addr1:0a19fe5c value:aa aa aa aa 00 00 00 00 addr2:9675cad0 value:aa aa aa aa 00 00 00 00 311 | A_point:1024, B_point:866 312 | 313 | -------------------------------------------------------------------------------- /DifferentReplayLogDemo/different_replay_1.log: -------------------------------------------------------------------------------- 1 | ------Difference Found!------ 2 | ----padding history---- 3 | padding,rrid:6656644872,pc:83c9cd01, sp:8eabaab4,len:36 4 | pc:83c9cd01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00061d01, pid: 880, pname: svchost.exe 5 | 6 | padding,rrid:6656644945,pc:83c0a0e3, sp:8eabaa80,len:12 7 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 8 | 9 | padding,rrid:6656645053,pc:83ca0fc3, sp:8eabaab4,len:44 10 | pc:83ca0fc3 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00065fc3, pid: 880, pname: svchost.exe 11 | 12 | padding,rrid:6656645135,pc:83c0a0e3, sp:8eabaa80,len:12 13 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 14 | 15 | padding,rrid:6656645236,pc:83ca0fc3, sp:8eabaa8c,len:44 16 | pc:83ca0fc3 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00065fc3, pid: 880, pname: svchost.exe 17 | 18 | padding,rrid:6656645318,pc:83c0a0e3, sp:8eabaa58,len:12 19 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 20 | 21 | padding,rrid:6656645785,pc:8a434ae1, sp:8eabaae0,len:16 22 | pc:8a434ae1 in module: \SystemRoot\System32\Drivers\Ntfs.sys, base: 8a41c000, offset: 00018ae1, pid: 880, pname: svchost.exe 23 | 24 | padding,rrid:6656646207,pc:83c9690c, sp:8eabaacc,len:36 25 | pc:83c9690c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005b90c, pid: 880, pname: svchost.exe 26 | 27 | padding,rrid:6656646303,pc:83c0a0e3, sp:8eabaa98,len:12 28 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 29 | 30 | padding,rrid:6656646469,pc:83ca8c93, sp:8eafd698,len:20 31 | pc:83ca8c93 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0006dc93, pid: 880, pname: svchost.exe 32 | 33 | padding,rrid:6656646626,pc:83c0a0e3, sp:8eafd668,len:12 34 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 35 | 36 | padding,rrid:6656646873,pc:83cc58c0, sp:8eafd69c,len:20 37 | pc:83cc58c0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0008a8c0, pid: 880, pname: svchost.exe 38 | 39 | padding,rrid:6656647005,pc:83c9690c, sp:8eafd694,len:36 40 | pc:83c9690c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005b90c, pid: 880, pname: svchost.exe 41 | 42 | padding,rrid:6656647104,pc:83c0a0e3, sp:8eafd660,len:12 43 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 44 | 45 | padding,rrid:6656647342,pc:83c0a0e3, sp:8eafd67c,len:12 46 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 47 | 48 | padding,rrid:6656647422,pc:83c9690c, sp:8eafd68c,len:36 49 | pc:83c9690c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005b90c, pid: 880, pname: svchost.exe 50 | 51 | padding,rrid:6656647521,pc:83c0a0e3, sp:8eafd658,len:12 52 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 53 | 54 | padding,rrid:6656647675,pc:83c9476e, sp:8eafd6dc,len:36 55 | pc:83c9476e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005976e, pid: 880, pname: svchost.exe 56 | 57 | padding,rrid:6656647776,pc:8a3ae41d, sp:8eafd658,len:64 58 | pc:8a3ae41d in module: \SystemRoot\system32\drivers\fltmgr.sys, base: 8a3ac000, offset: 0000241d, pid: 880, pname: svchost.exe 59 | 60 | padding,rrid:6656647922,pc:83c0a0e3, sp:8eafd624,len:12 61 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 62 | 63 | padding,rrid:6656648065,pc:8a3e794b, sp:8eafd624,len:16 64 | pc:8a3e794b in module: \SystemRoot\system32\drivers\fileinfo.sys, base: 8a3e0000, offset: 0000794b, pid: 880, pname: svchost.exe 65 | 66 | padding,rrid:6656648430,pc:83c9326a, sp:8eafd6b8,len:4 67 | pc:83c9326a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005826a, pid: 880, pname: svchost.exe 68 | 69 | padding,rrid:6656648431,pc:83c9326d, sp:8eafd6ac,len:12 70 | pc:83c9326d in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005826d, pid: 880, pname: svchost.exe 71 | 72 | padding,rrid:6656648505,pc:83c9332c, sp:8eafd680,len:4 73 | pc:83c9332c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005832c, pid: 880, pname: svchost.exe 74 | 75 | padding,rrid:6656648506,pc:83c9332f, sp:8eafd664,len:28 76 | pc:83c9332f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005832f, pid: 880, pname: svchost.exe 77 | 78 | padding,rrid:6656648539,pc:83c0a0e3, sp:8eafd634,len:12 79 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 80 | 81 | padding,rrid:6656648685,pc:83c92ae1, sp:8eafd958,len:4 82 | pc:83c92ae1 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057ae1, pid: 880, pname: svchost.exe 83 | 84 | padding,rrid:6656648686,pc:83c92ae4, sp:8eafd904,len:84 85 | pc:83c92ae4 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057ae4, pid: 880, pname: svchost.exe 86 | 87 | padding,rrid:6656648823,pc:83c0a0e3, sp:8eafd8bc,len:12 88 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 89 | 90 | padding,rrid:6656648930,pc:83c0a0e3, sp:8eafd950,len:12 91 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 92 | 93 | padding,rrid:6656649125,pc:83e59b40, sp:8eafd988,len:4 94 | pc:83e59b40 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0021eb40, pid: 880, pname: svchost.exe 95 | 96 | padding,rrid:6656649126,pc:83e59b43, sp:8eafd95c,len:44 97 | pc:83e59b43 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0021eb43, pid: 880, pname: svchost.exe 98 | 99 | padding,rrid:6656649228,pc:83ca7cd0, sp:8eafd90c,len:20 100 | pc:83ca7cd0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0006ccd0, pid: 880, pname: svchost.exe 101 | 102 | padding,rrid:6656649559,pc:83c0a0e3, sp:8eafd918,len:12 103 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 104 | 105 | padding,rrid:6656649675,pc:83c0a0e3, sp:8eafd91c,len:12 106 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 107 | 108 | padding,rrid:6656649782,pc:83c0a0e3, sp:8eafd91c,len:12 109 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 110 | 111 | padding,rrid:6656649863,pc:8a3b2661, sp:8eafd918,len:24 112 | pc:8a3b2661 in module: \SystemRoot\system32\drivers\fltmgr.sys, base: 8a3ac000, offset: 00006661, pid: 880, pname: svchost.exe 113 | 114 | padding,rrid:6656650041,pc:8a3ad745, sp:8eafd8a4,len:12 115 | pc:8a3ad745 in module: \SystemRoot\system32\drivers\fltmgr.sys, base: 8a3ac000, offset: 00001745, pid: 880, pname: svchost.exe 116 | 117 | padding,rrid:6656650519,pc:8a3aea9b, sp:8eafd878,len:76 118 | pc:8a3aea9b in module: \SystemRoot\system32\drivers\fltmgr.sys, base: 8a3ac000, offset: 00002a9b, pid: 880, pname: svchost.exe 119 | 120 | padding,rrid:6656650785,pc:8a3b7614, sp:8eafd834,len:16 121 | pc:8a3b7614 in module: \SystemRoot\system32\drivers\fltmgr.sys, base: 8a3ac000, offset: 0000b614, pid: 880, pname: svchost.exe 122 | 123 | padding,rrid:6656650989,pc:8a3b7614, sp:8eafd7fc,len:16 124 | pc:8a3b7614 in module: \SystemRoot\system32\drivers\fltmgr.sys, base: 8a3ac000, offset: 0000b614, pid: 880, pname: svchost.exe 125 | 126 | padding,rrid:6656651141,pc:8a3b7614, sp:8eafd800,len:12 127 | pc:8a3b7614 in module: \SystemRoot\system32\drivers\fltmgr.sys, base: 8a3ac000, offset: 0000b614, pid: 880, pname: svchost.exe 128 | 129 | padding,rrid:6656651779,pc:83cc5a6a, sp:8eafd810,len:4 130 | pc:83cc5a6a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0008aa6a, pid: 880, pname: svchost.exe 131 | 132 | padding,rrid:6656651780,pc:83cc5a6d, sp:8eafd7cc,len:68 133 | pc:83cc5a6d in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0008aa6d, pid: 880, pname: svchost.exe 134 | 135 | padding,rrid:6656652884,pc:8a3b22b7, sp:8eafd8e8,len:16 136 | pc:8a3b22b7 in module: \SystemRoot\system32\drivers\fltmgr.sys, base: 8a3ac000, offset: 000062b7, pid: 880, pname: svchost.exe 137 | 138 | padding,rrid:6656653119,pc:8a42a2a8, sp:8eafd858,len:84 139 | pc:8a42a2a8 in module: \SystemRoot\System32\Drivers\Ntfs.sys, base: 8a41c000, offset: 0000e2a8, pid: 880, pname: svchost.exe 140 | 141 | padding,rrid:6656653277,pc:83c0a0e3, sp:8eafd824,len:12 142 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 143 | 144 | padding,rrid:6656653344,pc:83cc58c0, sp:8eafd808,len:20 145 | pc:83cc58c0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0008a8c0, pid: 880, pname: svchost.exe 146 | 147 | padding,rrid:6656653487,pc:8a42d5c2, sp:8eafd820,len:16 148 | pc:8a42d5c2 in module: \SystemRoot\System32\Drivers\Ntfs.sys, base: 8a41c000, offset: 000115c2, pid: 880, pname: svchost.exe 149 | 150 | padding,rrid:6656653756,pc:8a42a2a8, sp:8eafd7e0,len:72 151 | pc:8a42a2a8 in module: \SystemRoot\System32\Drivers\Ntfs.sys, base: 8a41c000, offset: 0000e2a8, pid: 880, pname: svchost.exe 152 | 153 | padding,rrid:6656653823,pc:8a42a2a8, sp:8eafd7f4,len:28 154 | pc:8a42a2a8 in module: \SystemRoot\System32\Drivers\Ntfs.sys, base: 8a41c000, offset: 0000e2a8, pid: 880, pname: svchost.exe 155 | 156 | padding,rrid:6656653885,pc:83c9ccfe, sp:8eafd7b8,len:4 157 | pc:83c9ccfe in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00061cfe, pid: 880, pname: svchost.exe 158 | 159 | padding,rrid:6656653886,pc:83c9cd01, sp:8eafd794,len:36 160 | pc:83c9cd01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00061d01, pid: 880, pname: svchost.exe 161 | 162 | padding,rrid:6656653959,pc:83c0a0e3, sp:8eafd760,len:12 163 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 164 | 165 | padding,rrid:6656654066,pc:83ca0fc3, sp:8eafd76c,len:44 166 | pc:83ca0fc3 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00065fc3, pid: 880, pname: svchost.exe 167 | 168 | padding,rrid:6656654148,pc:83c0a0e3, sp:8eafd738,len:12 169 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 170 | 171 | padding,rrid:6656654294,pc:83cc270a, sp:8eafd7a8,len:12 172 | pc:83cc270a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0008770a, pid: 880, pname: svchost.exe 173 | 174 | padding,rrid:6656654433,pc:83c0a0e3, sp:8eafd7c0,len:12 175 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 176 | 177 | padding,rrid:6656654571,pc:83c0a0e3, sp:8eafd7a4,len:12 178 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 179 | 180 | padding,rrid:6656654799,pc:83c9690c, sp:8eafd77c,len:36 181 | pc:83c9690c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005b90c, pid: 880, pname: svchost.exe 182 | 183 | padding,rrid:6656654898,pc:83c0a0e3, sp:8eafd748,len:12 184 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 185 | 186 | padding,rrid:6656654974,pc:83c9690c, sp:8eafd7ac,len:36 187 | pc:83c9690c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005b90c, pid: 880, pname: svchost.exe 188 | 189 | padding,rrid:6656655070,pc:83c0a0e3, sp:8eafd778,len:12 190 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 191 | 192 | padding,rrid:6656655429,pc:83c9476e, sp:8eafd7f0,len:36 193 | pc:83c9476e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005976e, pid: 880, pname: svchost.exe 194 | 195 | padding,rrid:6656655523,pc:83c9326d, sp:8eafd7c4,len:12 196 | pc:83c9326d in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005826d, pid: 880, pname: svchost.exe 197 | 198 | padding,rrid:6656655597,pc:83c9332c, sp:8eafd798,len:4 199 | pc:83c9332c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005832c, pid: 880, pname: svchost.exe 200 | 201 | padding,rrid:6656655598,pc:83c9332f, sp:8eafd77c,len:28 202 | pc:83c9332f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005832f, pid: 880, pname: svchost.exe 203 | 204 | padding,rrid:6656655631,pc:83c0a0e3, sp:8eafd74c,len:12 205 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 206 | 207 | padding,rrid:6656655809,pc:83c0a0e3, sp:8eafd928,len:12 208 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 209 | 210 | padding,rrid:6656655941,pc:83d59aad, sp:8eafd8f4,len:76 211 | pc:83d59aad in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0011eaad, pid: 880, pname: svchost.exe 212 | 213 | padding,rrid:6656656184,pc:83c0a0e3, sp:8eafd914,len:12 214 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 215 | 216 | padding,rrid:6656656305,pc:83c0a0e3, sp:8eafd914,len:12 217 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 218 | 219 | padding,rrid:6656656364,pc:83e49b03, sp:8eafd97c,len:20 220 | pc:83e49b03 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0020eb03, pid: 880, pname: svchost.exe 221 | 222 | padding,rrid:6656656461,pc:83d59aa5, sp:8eafd968,len:4 223 | pc:83d59aa5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0011eaa5, pid: 880, pname: svchost.exe 224 | 225 | padding,rrid:6656656463,pc:83d59aad, sp:8eafd91c,len:76 226 | pc:83d59aad in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0011eaad, pid: 880, pname: svchost.exe 227 | 228 | padding,rrid:6656659984,pc:83c75d95, sp:8eafdd7c,len:4 229 | pc:83c75d95 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0003ad95, pid: 880, pname: svchost.exe 230 | 231 | padding,rrid:6656659992,pc:83c75da3, sp:8eafdd34,len:48 232 | pc:83c75da3 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0003ada3, pid: 880, pname: svchost.exe 233 | 234 | padding,rrid:6656660051,pc:83c9d3eb, sp:8eafdd18,len:4 235 | pc:83c9d3eb in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000623eb, pid: 880, pname: svchost.exe 236 | 237 | padding,rrid:6656660052,pc:83c9d3ee, sp:8eafdcd4,len:68 238 | pc:83c9d3ee in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000623ee, pid: 880, pname: svchost.exe 239 | 240 | padding,rrid:6656660409,pc:83ca02c7, sp:8eafdc5c,len:72 241 | pc:83ca02c7 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000652c7, pid: 880, pname: svchost.exe 242 | 243 | padding,rrid:6656660450,pc:83cdfe19, sp:8eafdc34,len:16 244 | pc:83cdfe19 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000a4e19, pid: 880, pname: svchost.exe 245 | 246 | padding,rrid:6656660555,pc:83cac010, sp:8eafdc0c,len:28 247 | pc:83cac010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00071010, pid: 880, pname: svchost.exe 248 | 249 | padding,rrid:6656660691,pc:83cab8a8, sp:8eafdbd8,len:4 250 | pc:83cab8a8 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000708a8, pid: 880, pname: svchost.exe 251 | 252 | padding,rrid:6656660692,pc:83cab8ab, sp:8eafdbbc,len:28 253 | pc:83cab8ab in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000708ab, pid: 880, pname: svchost.exe 254 | 255 | padding,rrid:6656660765,pc:83cd2a77, sp:8eafdb8c,len:24 256 | pc:83cd2a77 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00097a77, pid: 880, pname: svchost.exe 257 | 258 | padding,rrid:6656661009,pc:83c0a0e3, sp:8eafdb74,len:12 259 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 260 | 261 | padding,rrid:6656661069,pc:83cd9a54, sp:8eafdb74,len:36 262 | pc:83cd9a54 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0009ea54, pid: 880, pname: svchost.exe 263 | 264 | padding,rrid:6656661163,pc:83cb4984, sp:8eafdb40,len:16 265 | pc:83cb4984 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00079984, pid: 880, pname: svchost.exe 266 | 267 | padding,rrid:6656661266,pc:83caa0cf, sp:8eafdb14,len:12 268 | pc:83caa0cf in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0006f0cf, pid: 880, pname: svchost.exe 269 | 270 | padding,rrid:6656661394,pc:83cb3c37, sp:8eafdca4,len:20 271 | pc:83cb3c37 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00078c37, pid: 880, pname: svchost.exe 272 | 273 | padding,rrid:6656661523,pc:83c0a0e3, sp:8eafdd10,len:12 274 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 880, pname: svchost.exe 275 | 276 | padding,rrid:6656661975,pc:83c73dbf, sp:8eafdd7c,len:4 277 | pc:83c73dbf in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00038dbf, pid: 880, pname: svchost.exe 278 | 279 | padding,rrid:6656661983,pc:83c73dcd, sp:8eafdd34,len:48 280 | pc:83c73dcd in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00038dcd, pid: 880, pname: svchost.exe 281 | 282 | padding,rrid:6656662826,pc:83c70350, sp:8eafdd34,len:72 283 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 880, pname: svchost.exe 284 | 285 | padding,rrid:6656662879,pc:83c70592, sp:8eafdd20,len:20 286 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 880, pname: svchost.exe 287 | 288 | padding,rrid:6656663628,pc:83c92838, sp:8eafdc74,len:148 289 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 880, pname: svchost.exe 290 | 291 | padding,rrid:6656663739,pc:83e3bc01, sp:8eafdc04,len:28 292 | pc:83e3bc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200c01, pid: 880, pname: svchost.exe 293 | 294 | padding,rrid:6656663983,pc:8a40ba77, sp:8eafdbe4,len:68 295 | pc:8a40ba77 in module: \SystemRoot\System32\drivers\discache.sys, base: 8a40a000, offset: 00001a77, pid: 880, pname: svchost.exe 296 | 297 | padding,rrid:6656664058,pc:83e3bbfe, sp:8eafdb68,len:4 298 | pc:83e3bbfe in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200bfe, pid: 880, pname: svchost.exe 299 | 300 | padding,rrid:6656664059,pc:83e3bc01, sp:8eafdb4c,len:28 301 | pc:83e3bc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200c01, pid: 880, pname: svchost.exe 302 | 303 | ----[A]----: 304 | rr_icount:6656664230 305 | pc:83e5b3df in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 002203df, pid: 880, pname: svchost.exe 306 | addr1:01b9f338 value:90 b0 c9 83 00 00 00 00 addr2:00000000 value:00 00 00 00 00 00 00 00 307 | ----[B]----: 308 | rr_icount:6656664230 309 | pc:83e5b3df in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 002203df, pid: 880, pname: svchost.exe 310 | addr1:01b9f338 value:aa aa aa aa 00 00 00 00 addr2:00000000 value:00 00 00 00 00 00 00 00 311 | A_point:1024, B_point:161 -------------------------------------------------------------------------------- /DifferentReplayLogDemo/different_replay_0.log: -------------------------------------------------------------------------------- 1 | ------Difference Found!------ 2 | ----padding history---- 3 | padding,rrid:6646278896,pc:83e9403f, sp:97253c90,len:4 4 | pc:83e9403f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0025903f, pid: 448, pname: services.exe 5 | 6 | padding,rrid:6646278897,pc:83e94042, sp:97253c68,len:40 7 | pc:83e94042 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00259042, pid: 448, pname: services.exe 8 | 9 | padding,rrid:6646278920,pc:83e8597e, sp:97253c3c,len:24 10 | pc:83e8597e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0024a97e, pid: 448, pname: services.exe 11 | 12 | padding,rrid:6646279167,pc:83c70350, sp:97253d34,len:72 13 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 448, pname: services.exe 14 | 15 | padding,rrid:6646279220,pc:83c70592, sp:97253d30,len:4 16 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 448, pname: services.exe 17 | 18 | padding,rrid:6646280057,pc:83e5a1bf, sp:97253cd8,len:4 19 | pc:83e5a1bf in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0021f1bf, pid: 448, pname: services.exe 20 | 21 | padding,rrid:6646280058,pc:83e5a1c2, sp:97253cac,len:44 22 | pc:83e5a1c2 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0021f1c2, pid: 448, pname: services.exe 23 | 24 | padding,rrid:6646280175,pc:83e9403f, sp:97253c90,len:4 25 | pc:83e9403f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0025903f, pid: 448, pname: services.exe 26 | 27 | padding,rrid:6646280176,pc:83e94042, sp:97253c68,len:40 28 | pc:83e94042 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00259042, pid: 448, pname: services.exe 29 | 30 | padding,rrid:6646280219,pc:83e8597e, sp:97253c3c,len:24 31 | pc:83e8597e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0024a97e, pid: 448, pname: services.exe 32 | 33 | padding,rrid:6646280520,pc:83c70350, sp:97253d34,len:72 34 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 448, pname: services.exe 35 | 36 | padding,rrid:6646280573,pc:83c70592, sp:97253d28,len:12 37 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 448, pname: services.exe 38 | 39 | padding,rrid:6646281320,pc:83c92838, sp:97253cf4,len:28 40 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 448, pname: services.exe 41 | 42 | padding,rrid:6646281381,pc:83e3bc01, sp:97253c84,len:28 43 | pc:83e3bc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200c01, pid: 448, pname: services.exe 44 | 45 | padding,rrid:6646281609,pc:83c94d11, sp:97253c6c,len:28 46 | pc:83c94d11 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00059d11, pid: 448, pname: services.exe 47 | 48 | padding,rrid:6646281727,pc:83c9332f, sp:97253c84,len:28 49 | pc:83c9332f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005832f, pid: 448, pname: services.exe 50 | 51 | padding,rrid:6646281800,pc:83c98457, sp:97253c30,len:4 52 | pc:83c98457 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005d457, pid: 448, pname: services.exe 53 | 54 | padding,rrid:6646281801,pc:83c9845a, sp:97253bcc,len:100 55 | pc:83c9845a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005d45a, pid: 448, pname: services.exe 56 | 57 | padding,rrid:6646282028,pc:83c0a0e3, sp:97253c54,len:12 58 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 448, pname: services.exe 59 | 60 | padding,rrid:6646283844,pc:83c70350, sp:97253d34,len:72 61 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 448, pname: services.exe 62 | 63 | padding,rrid:6646283897,pc:83c70592, sp:97253d14,len:32 64 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 448, pname: services.exe 65 | 66 | padding,rrid:6646284644,pc:83e8df25, sp:97253d08,len:4 67 | pc:83e8df25 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00252f25, pid: 448, pname: services.exe 68 | 69 | padding,rrid:6646284645,pc:83e8df28, sp:97253cdc,len:44 70 | pc:83e8df28 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00252f28, pid: 448, pname: services.exe 71 | 72 | padding,rrid:6646284691,pc:83e3bbfe, sp:97253c88,len:4 73 | pc:83e3bbfe in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200bfe, pid: 448, pname: services.exe 74 | 75 | padding,rrid:6646284692,pc:83e3bc01, sp:97253c6c,len:28 76 | pc:83e3bc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200c01, pid: 448, pname: services.exe 77 | 78 | padding,rrid:6646284854,pc:83c92838, sp:97253c48,len:96 79 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 448, pname: services.exe 80 | 81 | padding,rrid:6646285008,pc:83e4bece, sp:97253c0c,len:20 82 | pc:83e4bece in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00210ece, pid: 448, pname: services.exe 83 | 84 | padding,rrid:6646285279,pc:83e88f9c, sp:97253c14,len:28 85 | pc:83e88f9c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0024df9c, pid: 448, pname: services.exe 86 | 87 | padding,rrid:6646285448,pc:83c92838, sp:97253be4,len:8 88 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 448, pname: services.exe 89 | 90 | padding,rrid:6646285473,pc:83e5fc49, sp:97253bb8,len:12 91 | pc:83e5fc49 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00224c49, pid: 448, pname: services.exe 92 | 93 | padding,rrid:6646285672,pc:83c94d11, sp:97253b90,len:28 94 | pc:83c94d11 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00059d11, pid: 448, pname: services.exe 95 | 96 | padding,rrid:6646285785,pc:83c9332c, sp:97253bc0,len:4 97 | pc:83c9332c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005832c, pid: 448, pname: services.exe 98 | 99 | padding,rrid:6646285786,pc:83c9332f, sp:97253ba4,len:28 100 | pc:83c9332f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005832f, pid: 448, pname: services.exe 101 | 102 | padding,rrid:6646285859,pc:83c98457, sp:97253b50,len:4 103 | pc:83c98457 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005d457, pid: 448, pname: services.exe 104 | 105 | padding,rrid:6646285860,pc:83c9845a, sp:97253aec,len:100 106 | pc:83c9845a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005d45a, pid: 448, pname: services.exe 107 | 108 | padding,rrid:6646286081,pc:83c0a0e3, sp:97253b74,len:12 109 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 448, pname: services.exe 110 | 111 | padding,rrid:6646287136,pc:83c70350, sp:97253d34,len:72 112 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 448, pname: services.exe 113 | 114 | padding,rrid:6646287189,pc:83c70592, sp:97253d24,len:16 115 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 448, pname: services.exe 116 | 117 | padding,rrid:6646287937,pc:83c92838, sp:97253cd4,len:56 118 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 448, pname: services.exe 119 | 120 | padding,rrid:6646288021,pc:83e3bc01, sp:97253c64,len:28 121 | pc:83e3bc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200c01, pid: 448, pname: services.exe 122 | 123 | padding,rrid:6646288240,pc:83c0a0e3, sp:97253c9c,len:12 124 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 448, pname: services.exe 125 | 126 | padding,rrid:6646288687,pc:83c70350, sp:97253d34,len:72 127 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 448, pname: services.exe 128 | 129 | padding,rrid:6646288740,pc:83c70592, sp:97253d2c,len:8 130 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 448, pname: services.exe 131 | 132 | padding,rrid:6646289486,pc:83c92838, sp:97253cc8,len:76 133 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 448, pname: services.exe 134 | 135 | padding,rrid:6646289549,pc:83e3bbfe, sp:97253c70,len:4 136 | pc:83e3bbfe in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200bfe, pid: 448, pname: services.exe 137 | 138 | padding,rrid:6646289550,pc:83e3bc01, sp:97253c54,len:28 139 | pc:83e3bc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200c01, pid: 448, pname: services.exe 140 | 141 | padding,rrid:6646289780,pc:83c0a0e3, sp:97253c90,len:12 142 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 448, pname: services.exe 143 | 144 | padding,rrid:6646289851,pc:83c92838, sp:97253c68,len:24 145 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 448, pname: services.exe 146 | 147 | padding,rrid:6646289883,pc:83c99dd5, sp:97253bfc,len:60 148 | pc:83c99dd5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005edd5, pid: 448, pname: services.exe 149 | 150 | padding,rrid:6646290092,pc:83c993fc, sp:97253bc4,len:20 151 | pc:83c993fc in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005e3fc, pid: 448, pname: services.exe 152 | 153 | padding,rrid:6646290172,pc:83c97b41, sp:97253b6c,len:60 154 | pc:83c97b41 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005cb41, pid: 448, pname: services.exe 155 | 156 | padding,rrid:6646290277,pc:83c9a517, sp:97253b8c,len:36 157 | pc:83c9a517 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f517, pid: 448, pname: services.exe 158 | 159 | padding,rrid:6646290329,pc:83c9a91e, sp:97253b70,len:4 160 | pc:83c9a91e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f91e, pid: 448, pname: services.exe 161 | 162 | padding,rrid:6646290330,pc:83c9a921, sp:97253b54,len:28 163 | pc:83c9a921 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f921, pid: 448, pname: services.exe 164 | 165 | padding,rrid:6646290398,pc:83c934e0, sp:97253b6c,len:16 166 | pc:83c934e0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000584e0, pid: 448, pname: services.exe 167 | 168 | padding,rrid:6646290505,pc:83c9a785, sp:80eb3bcc,len:16 169 | pc:83c9a785 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f785, pid: 448, pname: services.exe 170 | 171 | padding,rrid:6646290586,pc:83c0a0e3, sp:80eb3bc4,len:12 172 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 448, pname: services.exe 173 | 174 | padding,rrid:6646290855,pc:83c70350, sp:80eb3d34,len:72 175 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 448, pname: services.exe 176 | 177 | padding,rrid:6646290908,pc:83c70592, sp:80eb3d30,len:4 178 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 448, pname: services.exe 179 | 180 | padding,rrid:6646291677,pc:83e3bc01, sp:80eb3cbc,len:28 181 | pc:83e3bc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200c01, pid: 448, pname: services.exe 182 | 183 | padding,rrid:6646295804,pc:83c70350, sp:80eb3d34,len:72 184 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 448, pname: services.exe 185 | 186 | padding,rrid:6646295857,pc:83c70592, sp:80eb3d28,len:12 187 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 448, pname: services.exe 188 | 189 | padding,rrid:6646296604,pc:83c92838, sp:80eb3ce4,len:44 190 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 448, pname: services.exe 191 | 192 | padding,rrid:6646296664,pc:83e3bc01, sp:80eb3c74,len:28 193 | pc:83e3bc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200c01, pid: 448, pname: services.exe 194 | 195 | padding,rrid:6646296831,pc:83c92ae4, sp:80eb3c64,len:84 196 | pc:83c92ae4 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057ae4, pid: 448, pname: services.exe 197 | 198 | padding,rrid:6646297002,pc:83c0a0e3, sp:80eb3c1c,len:12 199 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 448, pname: services.exe 200 | 201 | padding,rrid:6646298667,pc:83c70350, sp:80eb3d34,len:72 202 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 448, pname: services.exe 203 | 204 | padding,rrid:6646298720,pc:83c70592, sp:80eb3d28,len:12 205 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 448, pname: services.exe 206 | 207 | padding,rrid:6646299467,pc:83c92838, sp:80eb3ce4,len:44 208 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 448, pname: services.exe 209 | 210 | padding,rrid:6646299527,pc:83e3bc01, sp:80eb3c74,len:28 211 | pc:83e3bc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00200c01, pid: 448, pname: services.exe 212 | 213 | padding,rrid:6646299694,pc:83c92ae4, sp:80eb3c64,len:84 214 | pc:83c92ae4 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057ae4, pid: 448, pname: services.exe 215 | 216 | padding,rrid:6646299864,pc:83c993fc, sp:80eb3c2c,len:20 217 | pc:83c993fc in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005e3fc, pid: 448, pname: services.exe 218 | 219 | padding,rrid:6646299982,pc:83c97b41, sp:80eb3bd4,len:60 220 | pc:83c97b41 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005cb41, pid: 448, pname: services.exe 221 | 222 | padding,rrid:6646300093,pc:83c9a517, sp:80eb3bf4,len:36 223 | pc:83c9a517 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f517, pid: 448, pname: services.exe 224 | 225 | padding,rrid:6646300145,pc:83c9a91e, sp:80eb3bd8,len:4 226 | pc:83c9a91e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f91e, pid: 448, pname: services.exe 227 | 228 | padding,rrid:6646300146,pc:83c9a921, sp:80eb3bbc,len:28 229 | pc:83c9a921 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f921, pid: 448, pname: services.exe 230 | 231 | padding,rrid:6646300216,pc:83c934e0, sp:80eb3bd4,len:16 232 | pc:83c934e0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000584e0, pid: 448, pname: services.exe 233 | 234 | padding,rrid:6646300323,pc:83c9a785, sp:80dc1bcc,len:16 235 | pc:83c9a785 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f785, pid: 448, pname: services.exe 236 | 237 | padding,rrid:6646300399,pc:83c0a0e3, sp:80dc1bc4,len:12 238 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 448, pname: services.exe 239 | 240 | padding,rrid:6646300795,pc:83c70350, sp:80dc1d34,len:72 241 | pc:83c70350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035350, pid: 448, pname: services.exe 242 | 243 | padding,rrid:6646300848,pc:83c70592, sp:80dc1d2c,len:8 244 | pc:83c70592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00035592, pid: 448, pname: services.exe 245 | 246 | padding,rrid:6646301594,pc:83c92838, sp:80dc1cfc,len:24 247 | pc:83c92838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00057838, pid: 448, pname: services.exe 248 | 249 | padding,rrid:6646301640,pc:83c99012, sp:80dc1ca4,len:52 250 | pc:83c99012 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005e012, pid: 448, pname: services.exe 251 | 252 | padding,rrid:6646301778,pc:83c993fc, sp:80dc1c6c,len:20 253 | pc:83c993fc in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005e3fc, pid: 448, pname: services.exe 254 | 255 | padding,rrid:6646301900,pc:83c97b41, sp:80dc1c14,len:60 256 | pc:83c97b41 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005cb41, pid: 448, pname: services.exe 257 | 258 | padding,rrid:6646302024,pc:83c9a517, sp:80dc1c34,len:36 259 | pc:83c9a517 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f517, pid: 448, pname: services.exe 260 | 261 | padding,rrid:6646302076,pc:83c9a91e, sp:80dc1c18,len:4 262 | pc:83c9a91e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f91e, pid: 448, pname: services.exe 263 | 264 | padding,rrid:6646302077,pc:83c9a921, sp:80dc1bfc,len:28 265 | pc:83c9a921 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f921, pid: 448, pname: services.exe 266 | 267 | padding,rrid:6646302145,pc:83c934e0, sp:80dc1c14,len:16 268 | pc:83c934e0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000584e0, pid: 448, pname: services.exe 269 | 270 | padding,rrid:6646302252,pc:83c9a785, sp:8e9c2c0c,len:16 271 | pc:83c9a785 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0005f785, pid: 448, pname: services.exe 272 | 273 | padding,rrid:6646302328,pc:83c0a0e3, sp:8e9c2c04,len:12 274 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 448, pname: services.exe 275 | 276 | padding,rrid:6646302475,pc:83cacc2b, sp:8e9c2d18,len:4 277 | pc:83cacc2b in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00071c2b, pid: 448, pname: services.exe 278 | 279 | padding,rrid:6646302477,pc:83cacc31, sp:8e9c2cf4,len:36 280 | pc:83cacc31 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00071c31, pid: 448, pname: services.exe 281 | 282 | padding,rrid:6646302589,pc:83c0a0e3, sp:8e9c2cc4,len:12 283 | pc:83c0a0e3 in module: \SystemRoot\system32\halmacpi.dll, base: 83c05000, offset: 000050e3, pid: 448, pname: services.exe 284 | 285 | padding,rrid:6646302652,pc:83d59aa5, sp:8e9c2cb8,len:4 286 | pc:83d59aa5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0011eaa5, pid: 448, pname: services.exe 287 | 288 | padding,rrid:6646302654,pc:83d59aad, sp:8e9c2c6c,len:76 289 | pc:83d59aad in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0011eaad, pid: 448, pname: services.exe 290 | 291 | padding,rrid:6646302854,pc:83cb2b39, sp:8e9c2c14,len:16 292 | pc:83cb2b39 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00077b39, pid: 448, pname: services.exe 293 | 294 | padding,rrid:6646302994,pc:83c6c580, sp:8e9c2978,len:836 295 | pc:83c6c580 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 00031580, pid: 448, pname: services.exe 296 | 297 | padding,rrid:6646303240,pc:83ce6573, sp:8e9c2950,len:4 298 | pc:83ce6573 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000ab573, pid: 448, pname: services.exe 299 | 300 | padding,rrid:6646303241,pc:83ce6576, sp:8e9c2934,len:28 301 | pc:83ce6576 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 000ab576, pid: 448, pname: services.exe 302 | 303 | ----[A]----: 304 | rr_icount:6646303449 305 | pc:83c67a6c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0002ca6c, pid: 448, pname: services.exe 306 | addr1:00cbf238 value:4c b2 cb 00 00 00 00 00 addr2:8e9c2a84 value:4c b2 cb 00 00 00 00 00 307 | ----[B]----: 308 | rr_icount:6646303449 309 | pc:83c67a6c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c3b000, offset: 0002ca6c, pid: 448, pname: services.exe 310 | addr1:00cbf238 value:aa aa aa aa 00 00 00 00 addr2:8e9c2a84 value:aa aa aa aa 00 00 00 00 311 | A_point:1024, B_point:412 312 | ------Difference Found!------ -------------------------------------------------------------------------------- /DifferentReplayLogDemo/different_replay_2.log: -------------------------------------------------------------------------------- 1 | Difference Found!------ 2 | ----padding history---- 3 | padding,rrid:3687451783,pc:83c7c921, sp:a1c1bbfc,len:28 4 | pc:83c7c921 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f921, pid: 1808, pname: YoukuMediaCent 5 | 6 | padding,rrid:3687451851,pc:83c754e0, sp:a1c1bc14,len:16 7 | pc:83c754e0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000584e0, pid: 1808, pname: YoukuMediaCent 8 | 9 | padding,rrid:3687451941,pc:83c2ddb8, sp:a1c0fbf8,len:4 10 | pc:83c2ddb8 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010db8, pid: 1808, pname: YoukuMediaCent 11 | 12 | padding,rrid:3687451942,pc:83c2ddbb, sp:a1c0fbdc,len:28 13 | pc:83c2ddbb in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010dbb, pid: 1808, pname: YoukuMediaCent 14 | 15 | padding,rrid:3687452101,pc:83c2dfb5, sp:a1c0fb74,len:72 16 | pc:83c2dfb5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010fb5, pid: 1808, pname: YoukuMediaCent 17 | 18 | padding,rrid:3687452439,pc:83c7c785, sp:a1c0fc0c,len:16 19 | pc:83c7c785 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f785, pid: 1808, pname: YoukuMediaCent 20 | 21 | padding,rrid:3687452488,pc:840310e3, sp:a1c0fc04,len:12 22 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 1808, pname: YoukuMediaCent 23 | 24 | padding,rrid:3687452875,pc:83c52350, sp:a1c0fd34,len:72 25 | pc:83c52350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035350, pid: 1808, pname: YoukuMediaCent 26 | 27 | padding,rrid:3687452928,pc:83c52592, sp:a1c0fd2c,len:8 28 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 1808, pname: YoukuMediaCent 29 | 30 | padding,rrid:3687453674,pc:83c74838, sp:a1c0fcfc,len:24 31 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 1808, pname: YoukuMediaCent 32 | 33 | padding,rrid:3687453720,pc:83c7b012, sp:a1c0fca4,len:52 34 | pc:83c7b012 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005e012, pid: 1808, pname: YoukuMediaCent 35 | 36 | padding,rrid:3687453858,pc:83c7b3fc, sp:a1c0fc6c,len:20 37 | pc:83c7b3fc in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005e3fc, pid: 1808, pname: YoukuMediaCent 38 | 39 | padding,rrid:3687453980,pc:83c79b41, sp:a1c0fc14,len:60 40 | pc:83c79b41 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005cb41, pid: 1808, pname: YoukuMediaCent 41 | 42 | padding,rrid:3687454085,pc:83c7c517, sp:a1c0fc34,len:36 43 | pc:83c7c517 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f517, pid: 1808, pname: YoukuMediaCent 44 | 45 | padding,rrid:3687454137,pc:83c7c91e, sp:a1c0fc18,len:4 46 | pc:83c7c91e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f91e, pid: 1808, pname: YoukuMediaCent 47 | 48 | padding,rrid:3687454138,pc:83c7c921, sp:a1c0fbfc,len:28 49 | pc:83c7c921 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f921, pid: 1808, pname: YoukuMediaCent 50 | 51 | padding,rrid:3687454206,pc:83c754e0, sp:a1c0fc14,len:16 52 | pc:83c754e0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000584e0, pid: 1808, pname: YoukuMediaCent 53 | 54 | padding,rrid:3687454271,pc:83c2ddb8, sp:80fc1bb8,len:4 55 | pc:83c2ddb8 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010db8, pid: 1808, pname: YoukuMediaCent 56 | 57 | padding,rrid:3687454272,pc:83c2ddbb, sp:80fc1b9c,len:28 58 | pc:83c2ddbb in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010dbb, pid: 1808, pname: YoukuMediaCent 59 | 60 | padding,rrid:3687454431,pc:83c2dfb5, sp:80fc1b34,len:72 61 | pc:83c2dfb5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010fb5, pid: 1808, pname: YoukuMediaCent 62 | 63 | padding,rrid:3687454793,pc:840310e3, sp:80fc1bc4,len:12 64 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 1808, pname: YoukuMediaCent 65 | 66 | padding,rrid:3687455087,pc:83c52350, sp:80fc1d34,len:72 67 | pc:83c52350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035350, pid: 1808, pname: YoukuMediaCent 68 | 69 | padding,rrid:3687455140,pc:83c52592, sp:80fc1d20,len:20 70 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 1808, pname: YoukuMediaCent 71 | 72 | padding,rrid:3687455913,pc:83e1dc01, sp:80fc1cac,len:28 73 | pc:83e1dc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200c01, pid: 1808, pname: YoukuMediaCent 74 | 75 | padding,rrid:3687456093,pc:83c74838, sp:80fc1c98,len:12 76 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 1808, pname: YoukuMediaCent 77 | 78 | padding,rrid:3687456178,pc:83c4c93c, sp:80fc1ca0,len:16 79 | pc:83c4c93c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0002f93c, pid: 1808, pname: YoukuMediaCent 80 | 81 | padding,rrid:3687456238,pc:83c7532f, sp:80fc1c5c,len:28 82 | pc:83c7532f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005832f, pid: 1808, pname: YoukuMediaCent 83 | 84 | padding,rrid:3687456271,pc:840310e3, sp:80fc1c2c,len:12 85 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 1808, pname: YoukuMediaCent 86 | 87 | padding,rrid:3687456666,pc:83c52350, sp:80fc1d34,len:72 88 | pc:83c52350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035350, pid: 1808, pname: YoukuMediaCent 89 | 90 | padding,rrid:3687456719,pc:83c52592, sp:80fc1d2c,len:8 91 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 1808, pname: YoukuMediaCent 92 | 93 | padding,rrid:3687457465,pc:83c74838, sp:80fc1d00,len:20 94 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 1808, pname: YoukuMediaCent 95 | 96 | padding,rrid:3687457512,pc:83e1dbfe, sp:80fc1ca8,len:4 97 | pc:83e1dbfe in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200bfe, pid: 1808, pname: YoukuMediaCent 98 | 99 | padding,rrid:3687457513,pc:83e1dc01, sp:80fc1c8c,len:28 100 | pc:83e1dc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200c01, pid: 1808, pname: YoukuMediaCent 101 | 102 | padding,rrid:3687457665,pc:83c7526a, sp:80fc1cd8,len:4 103 | pc:83c7526a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005826a, pid: 1808, pname: YoukuMediaCent 104 | 105 | padding,rrid:3687457666,pc:83c7526d, sp:80fc1ccc,len:12 106 | pc:83c7526d in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005826d, pid: 1808, pname: YoukuMediaCent 107 | 108 | padding,rrid:3687457739,pc:83c76d11, sp:80fc1c78,len:28 109 | pc:83c76d11 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00059d11, pid: 1808, pname: YoukuMediaCent 110 | 111 | padding,rrid:3687457854,pc:83c7532c, sp:80fc1ca0,len:4 112 | pc:83c7532c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005832c, pid: 1808, pname: YoukuMediaCent 113 | 114 | padding,rrid:3687457855,pc:83c7532f, sp:80fc1c84,len:28 115 | pc:83c7532f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005832f, pid: 1808, pname: YoukuMediaCent 116 | 117 | padding,rrid:3687457950,pc:83c7a457, sp:80fc1c30,len:4 118 | pc:83c7a457 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005d457, pid: 1808, pname: YoukuMediaCent 119 | 120 | padding,rrid:3687457951,pc:83c7a45a, sp:80fc1bcc,len:100 121 | pc:83c7a45a in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005d45a, pid: 1808, pname: YoukuMediaCent 122 | 123 | padding,rrid:3687458220,pc:83c4ca44, sp:80fc1c64,len:12 124 | pc:83c4ca44 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0002fa44, pid: 1808, pname: YoukuMediaCent 125 | 126 | padding,rrid:3687458284,pc:83c754e0, sp:80fc1c64,len:16 127 | pc:83c754e0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000584e0, pid: 1808, pname: YoukuMediaCent 128 | 129 | padding,rrid:3687458349,pc:83c2ddb8, sp:8e898738,len:4 130 | pc:83c2ddb8 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010db8, pid: 1808, pname: YoukuMediaCent 131 | 132 | padding,rrid:3687458350,pc:83c2ddbb, sp:8e89871c,len:28 133 | pc:83c2ddbb in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010dbb, pid: 1808, pname: YoukuMediaCent 134 | 135 | padding,rrid:3687458509,pc:83c2dfb5, sp:8e8986b4,len:72 136 | pc:83c2dfb5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010fb5, pid: 1808, pname: YoukuMediaCent 137 | 138 | padding,rrid:3687458880,pc:840310e3, sp:8e898744,len:12 139 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 1808, pname: YoukuMediaCent 140 | 141 | padding,rrid:3687459229,pc:83c52350, sp:8e898d34,len:72 142 | pc:83c52350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035350, pid: 1808, pname: YoukuMediaCent 143 | 144 | padding,rrid:3687459282,pc:83c52592, sp:8e898d30,len:4 145 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 1808, pname: YoukuMediaCent 146 | 147 | padding,rrid:3687460119,pc:83e3c1bf, sp:8e898cd8,len:4 148 | pc:83e3c1bf in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0021f1bf, pid: 1808, pname: YoukuMediaCent 149 | 150 | padding,rrid:3687460120,pc:83e3c1c2, sp:8e898cac,len:44 151 | pc:83e3c1c2 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0021f1c2, pid: 1808, pname: YoukuMediaCent 152 | 153 | padding,rrid:3687460237,pc:83e7603f, sp:8e898c90,len:4 154 | pc:83e7603f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0025903f, pid: 1808, pname: YoukuMediaCent 155 | 156 | padding,rrid:3687460238,pc:83e76042, sp:8e898c68,len:40 157 | pc:83e76042 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00259042, pid: 1808, pname: YoukuMediaCent 158 | 159 | padding,rrid:3687460261,pc:83e6797e, sp:8e898c3c,len:24 160 | pc:83e6797e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0024a97e, pid: 1808, pname: YoukuMediaCent 161 | 162 | padding,rrid:3687460737,pc:83c52350, sp:8e898d34,len:72 163 | pc:83c52350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035350, pid: 1808, pname: YoukuMediaCent 164 | 165 | padding,rrid:3687460790,pc:83c52592, sp:8e898d20,len:20 166 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 1808, pname: YoukuMediaCent 167 | 168 | padding,rrid:3687461315,pc:83e09ca0, sp:8e898cc4,len:12 169 | pc:83e09ca0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 001ecca0, pid: 1808, pname: YoukuMediaCent 170 | 171 | padding,rrid:3687461343,pc:83e1dbfe, sp:8e898c78,len:4 172 | pc:83e1dbfe in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200bfe, pid: 1808, pname: YoukuMediaCent 173 | 174 | padding,rrid:3687461344,pc:83e1dc01, sp:8e898c5c,len:28 175 | pc:83e1dc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200c01, pid: 1808, pname: YoukuMediaCent 176 | 177 | padding,rrid:3687461529,pc:83d3b010, sp:8e898c44,len:60 178 | pc:83d3b010 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011e010, pid: 1808, pname: YoukuMediaCent 179 | 180 | padding,rrid:3687461768,pc:83c94c5e, sp:8e898c58,len:16 181 | pc:83c94c5e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077c5e, pid: 1808, pname: YoukuMediaCent 182 | 183 | padding,rrid:3687461840,pc:83c78d05, sp:8e898c88,len:4 184 | pc:83c78d05 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005bd05, pid: 1808, pname: YoukuMediaCent 185 | 186 | padding,rrid:3687461913,pc:83cc5012, sp:8e898c8c,len:20 187 | pc:83cc5012 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000a8012, pid: 1808, pname: YoukuMediaCent 188 | 189 | padding,rrid:3687461967,pc:83ca43b9, sp:8e898c70,len:4 190 | pc:83ca43b9 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000873b9, pid: 1808, pname: YoukuMediaCent 191 | 192 | padding,rrid:3687461968,pc:83ca43bc, sp:8e898c54,len:28 193 | pc:83ca43bc in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000873bc, pid: 1808, pname: YoukuMediaCent 194 | 195 | padding,rrid:3687462027,pc:83c7532c, sp:8e898c60,len:4 196 | pc:83c7532c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005832c, pid: 1808, pname: YoukuMediaCent 197 | 198 | padding,rrid:3687462028,pc:83c7532f, sp:8e898c44,len:28 199 | pc:83c7532f in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005832f, pid: 1808, pname: YoukuMediaCent 200 | 201 | padding,rrid:3687462061,pc:840310e3, sp:8e898c14,len:12 202 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 1808, pname: YoukuMediaCent 203 | 204 | padding,rrid:3687462391,pc:83c52350, sp:8e898d34,len:72 205 | pc:83c52350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035350, pid: 1808, pname: YoukuMediaCent 206 | 207 | padding,rrid:3687462444,pc:83c52592, sp:8e898d28,len:12 208 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 1808, pname: YoukuMediaCent 209 | 210 | padding,rrid:3687463191,pc:83c74838, sp:8e898ce4,len:44 211 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 1808, pname: YoukuMediaCent 212 | 213 | padding,rrid:3687463237,pc:83e1dc01, sp:8e898c74,len:28 214 | pc:83e1dc01 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00200c01, pid: 1808, pname: YoukuMediaCent 215 | 216 | padding,rrid:3687463404,pc:83c74ae4, sp:8e898c64,len:84 217 | pc:83c74ae4 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057ae4, pid: 1808, pname: YoukuMediaCent 218 | 219 | padding,rrid:3687463514,pc:83c7b3fc, sp:8e898c2c,len:20 220 | pc:83c7b3fc in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005e3fc, pid: 1808, pname: YoukuMediaCent 221 | 222 | padding,rrid:3687463629,pc:83c7c517, sp:8e898bf4,len:36 223 | pc:83c7c517 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f517, pid: 1808, pname: YoukuMediaCent 224 | 225 | padding,rrid:3687463681,pc:83c7c91e, sp:8e898bd8,len:4 226 | pc:83c7c91e in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f91e, pid: 1808, pname: YoukuMediaCent 227 | 228 | padding,rrid:3687463682,pc:83c7c921, sp:8e898bbc,len:28 229 | pc:83c7c921 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005f921, pid: 1808, pname: YoukuMediaCent 230 | 231 | padding,rrid:3687463750,pc:83c754e0, sp:8e898bd4,len:16 232 | pc:83c754e0 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000584e0, pid: 1808, pname: YoukuMediaCent 233 | 234 | padding,rrid:3687463815,pc:83c2ddb8, sp:80fc1c48,len:4 235 | pc:83c2ddb8 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010db8, pid: 1808, pname: YoukuMediaCent 236 | 237 | padding,rrid:3687463816,pc:83c2ddbb, sp:80fc1c2c,len:28 238 | pc:83c2ddbb in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010dbb, pid: 1808, pname: YoukuMediaCent 239 | 240 | padding,rrid:3687463975,pc:83c2dfb5, sp:80fc1bc4,len:72 241 | pc:83c2dfb5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00010fb5, pid: 1808, pname: YoukuMediaCent 242 | 243 | padding,rrid:3687464352,pc:840310e3, sp:80fc1c54,len:12 244 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 1808, pname: YoukuMediaCent 245 | 246 | padding,rrid:3687464467,pc:83e2bb03, sp:80fc1ca4,len:20 247 | pc:83e2bb03 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0020eb03, pid: 1808, pname: YoukuMediaCent 248 | 249 | padding,rrid:3687464541,pc:83c94b39, sp:80fc1c5c,len:16 250 | pc:83c94b39 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077b39, pid: 1808, pname: YoukuMediaCent 251 | 252 | padding,rrid:3687464629,pc:83d3baa5, sp:80fc1c90,len:4 253 | pc:83d3baa5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011eaa5, pid: 1808, pname: YoukuMediaCent 254 | 255 | padding,rrid:3687464631,pc:83d3baad, sp:80fc1c44,len:76 256 | pc:83d3baad in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011eaad, pid: 1808, pname: YoukuMediaCent 257 | 258 | padding,rrid:3687465083,pc:83c52350, sp:80fc1d34,len:72 259 | pc:83c52350 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035350, pid: 1808, pname: YoukuMediaCent 260 | 261 | padding,rrid:3687465136,pc:83c52592, sp:80fc1d2c,len:8 262 | pc:83c52592 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00035592, pid: 1808, pname: YoukuMediaCent 263 | 264 | padding,rrid:3687465882,pc:83c74838, sp:80fc1cfc,len:24 265 | pc:83c74838 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00057838, pid: 1808, pname: YoukuMediaCent 266 | 267 | padding,rrid:3687465928,pc:83c7b012, sp:80fc1ca4,len:52 268 | pc:83c7b012 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0005e012, pid: 1808, pname: YoukuMediaCent 269 | 270 | padding,rrid:3687466005,pc:83ca7ba5, sp:80fc1c6c,len:36 271 | pc:83ca7ba5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0008aba5, pid: 1808, pname: YoukuMediaCent 272 | 273 | padding,rrid:3687466034,pc:840310e3, sp:80fc1c3c,len:12 274 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 1808, pname: YoukuMediaCent 275 | 276 | padding,rrid:3687466170,pc:83c8ec2b, sp:80fc1d18,len:4 277 | pc:83c8ec2b in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00071c2b, pid: 1808, pname: YoukuMediaCent 278 | 279 | padding,rrid:3687466172,pc:83c8ec31, sp:80fc1cf4,len:36 280 | pc:83c8ec31 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00071c31, pid: 1808, pname: YoukuMediaCent 281 | 282 | padding,rrid:3687466284,pc:840310e3, sp:80fc1cc4,len:12 283 | pc:840310e3 in module: \SystemRoot\system32\halmacpi.dll, base: 8402c000, offset: 000050e3, pid: 1808, pname: YoukuMediaCent 284 | 285 | padding,rrid:3687466347,pc:83d3baa5, sp:80fc1cb8,len:4 286 | pc:83d3baa5 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011eaa5, pid: 1808, pname: YoukuMediaCent 287 | 288 | padding,rrid:3687466349,pc:83d3baad, sp:80fc1c6c,len:76 289 | pc:83d3baad in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0011eaad, pid: 1808, pname: YoukuMediaCent 290 | 291 | padding,rrid:3687466549,pc:83c94b39, sp:80fc1c14,len:16 292 | pc:83c94b39 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00077b39, pid: 1808, pname: YoukuMediaCent 293 | 294 | padding,rrid:3687466697,pc:83c4e580, sp:80fc1978,len:836 295 | pc:83c4e580 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 00031580, pid: 1808, pname: YoukuMediaCent 296 | 297 | padding,rrid:3687466943,pc:83cc8573, sp:80fc1950,len:4 298 | pc:83cc8573 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000ab573, pid: 1808, pname: YoukuMediaCent 299 | 300 | padding,rrid:3687466944,pc:83cc8576, sp:80fc1934,len:28 301 | pc:83cc8576 in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 000ab576, pid: 1808, pname: YoukuMediaCent 302 | 303 | ----[A]----: 304 | rr_icount:3687467152 305 | pc:83c49a6c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0002ca6c, pid: 1808, pname: YoukuMediaCent 306 | addr1:057afc8c value:00 00 00 00 00 00 00 00 addr2:80fc1a84 value:00 00 00 00 00 00 00 00 307 | ----[B]----: 308 | rr_icount:3687467152 309 | pc:83c49a6c in module: \SystemRoot\system32\ntoskrnl.exe, base: 83c1d000, offset: 0002ca6c, pid: 1808, pname: YoukuMediaCent 310 | addr1:057afc8c value:aa aa aa aa 00 00 00 00 addr2:80fc1a84 value:aa aa aa aa 00 00 00 00 311 | 312 | --------------------------------------------------------------------------------
TypeTaintSrcTaintDstTaintExprTaintOper
Taint Memory/[0x9c2ebb1c:0x9c2ebc93]<BV3008 TAINT_stackhole_0_0_512 .. TAINT_stackhole_64_1_512 .. TAINT_stackhole_128_2_512 .. TAINT_stackhole_192_3_512 .. TAINT_stackhole_256_4_512 .. TAINT_stackhole_320_5_448>manually Code: 0x83c71838 sub esp, eax
rrid:0x3c03e031e real_id:0x3a9a015f9
UnTaint Memory/[0x9c2ebc8c:0x9c2ebc8f]<BV32 0x9c2ebb0c>Code: 0x83c71848 mov dword ptr [ebp - 0x18], esp
rrid:0x3c03e0326 real_id:0x3a9a01601
UnTaint Memory/[0x9c2ebc84:0x9c2ebc84]<BV8 1>Code: 0x83de8c4e mov byte ptr [ebp - 0x20], bl
rrid:0x3c03e0331 real_id:0x3a9a0160c
UnTaint Memory/[0x9c2ebc8b:0x9c2ebc8b]<BV8 0>Code: 0x83de8c61 mov byte ptr [ebp - 0x19], 0
rrid:0x3c03e0334 real_id:0x3a9a0160f
UnTaint Memory/[0x9c2ebc84:0x9c2ebc87]<BV32 0x0>Code: 0x83de8d0f mov dword ptr [ebp - 0x20], eax
rrid:0x3c03e0349 real_id:0x3a9a01624
UnTaint Memory/[0x9c2ebc80:0x9c2ebc83]<BV32 0x0>Code: 0x83de8d7d mov dword ptr [ebp - 0x24], ecx
rrid:0x3c03e03ac real_id:0x3a9a01687
UnTaint Memory/[0x9c2ebb1c:0x9c2ebb1f]<BV32 0x500038>Code: 0x83de8dd6 mov dword ptr [ebp - 0x188], 0x500038
rrid:0x3c03e03b7 real_id:0x3a9a01692
UnTaint Memory/[0x9c2ebb20:0x9c2ebb23]<BV32 0x9>Code: 0x83de8de0 mov dword ptr [ebp - 0x184], 9
rrid:0x3c03e03b8 real_id:0x3a9a01693
UnTaint Memory/[0x9c2ebb34:0x9c2ebb37]<BV32 0xc0000135>Code: 0x83de8df0 mov dword ptr [ebp - 0x170], esi
rrid:0x3c03e03ba real_id:0x3a9a01695
UnTaint Memory/[0x9c2ebb44:0x9c2ebb47]<BV32 0x1>Code: 0x83de8df9 mov dword ptr [ebp - 0x160], eax
rrid:0x3c03e03bc real_id:0x3a9a01697
UnTaint Memory/[0x9c2ebb50:0x9c2ebb53]<BV32 0x3>Code: 0x83de8e02 mov dword ptr [ebp - 0x154], eax
rrid:0x3c03e03be real_id:0x3a9a01699
UnTaint Memory/[0x9c2ebb4c:0x9c2ebb4f]<BV32 0x2>Code: 0x83de8e0b mov dword ptr [ebp - 0x158], eax
rrid:0x3c03e03c0 real_id:0x3a9a0169b
UnTaint Memory/[0x9c2ebb54:0x9c2ebb57]<BV32 0x22f858>Code: 0x83c4aa6c mov dword ptr [edi + ecx*4 - 8], eax
rrid:0x3c03e03de real_id:0x3a9a016b9
UnTaint Memory/[0x9c2ebb58:0x9c2ebb5b]<BV32 0x773282e0>Code: 0x83c4aa74 mov dword ptr [edi + ecx*4 - 4], eax
rrid:0x3c03e03e0 real_id:0x3a9a016bb
UnTaint Memory/[0x9c2ebb40:0x9c2ebb43]<BV32 0x1d435c2>Code: 0x83c49150 mov dword ptr [esi + 4], eax
rrid:0x3c03e03fa real_id:0x3a9a016d5
UnTaint Memory/[0x9c2ebb3c:0x9c2ebb3f]<BV32 0xf3878720>Code: 0x83c49158 mov dword ptr [esi], eax
rrid:0x3c03e03fc real_id:0x3a9a016d7
Taint Memory[0x9c2ebb1c:0x9c2ebb33]
[0x9c2eb998:0x9c2eb9af]<BV192 0x3800500009000000#64 .. TAINT_stackhole_0_0_512[447:320]>Code: 0x83e2b35c rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x3c03e04bf real_id:0x3a9a01788
Taint Reg[0x9c2eb9a8:0x9c2eb9ab]
ecx<BV32 TAINT_stackhole_0_0_512[359:352] .. TAINT_stackhole_0_0_512[367:360] .. TAINT_stackhole_0_0_512[375:368] .. TAINT_stackhole_0_0_512[383:376]>Code: 0x83e652ea mov ecx, dword ptr [eax + 0x10]
rrid:0x3c03e04eb real_id:0x3a9a017b3
UnTaint Reg/ecx<BV32 0x0>Code: 0x83e65332 xor ecx, ecx
rrid:0x3c03e04fb real_id:0x3a9a017c3
UnTaint Memory/[0x9c2eb9a0:0x9c2eb9a3]<BV32 0xa14>Code: 0x83e65366 mov dword ptr [eax + 8], edx
rrid:0x3c03e04fe real_id:0x3a9a017c6
UnTaint Memory/[0x9c2eb9a4:0x9c2eb9a7]<BV32 0xdc4>Code: 0x83e6536f mov dword ptr [eax + 0xc], edx
rrid:0x3c03e0500 real_id:0x3a9a017c8
UnTaint Memory/[0x9c2eb9a8:0x9c2eb9ab]<BV32 0x0>Code: 0x83e65376 mov dword ptr [eax + 0x10], ecx
rrid:0x3c03e0502 real_id:0x3a9a017ca
UnTaint Memory/[0x9c2eb9ac:0x9c2eb9af]<BV32 0x0>Code: 0x83e6537b and dword ptr [eax + 0x14], 0
rrid:0x3c03e0504 real_id:0x3a9a017cc
Taint Memory[0x9c2ebb34:0x9c2ebb6b]
[0x9e5993f8:0x9e59942f]<BV448 0x350100c0#32 .. TAINT_stackhole_0_0_512[287:256] .. 0x208787f3c235d40101000000#96 .. TAINT_stackhole_0_0_512[159:128] .. 0x20000000300000058f82200e0823277#128 .. TAINT_stackhole_64_1_512[511:384]>Code: 0x83c4a973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x3c03e076e real_id:0x3a9a01a01
Taint Memory[0x9e5993f8:0x9e59942f]
[0x9cf978:0x9cf9af]<BV448 0x350100c0#32 .. TAINT_stackhole_0_0_512[287:256] .. 0x208787f3c235d40101000000#96 .. TAINT_stackhole_0_0_512[159:128] .. 0x20000000300000058f82200e0823277#128 .. TAINT_stackhole_64_1_512[511:384]>Code: 0x83c4a973 rep movsd dword ptr es:[edi], dword ptr [esi]
rrid:0x3c03e0cb1 real_id:0x3a9a01f30