Use RMB in process monitor -> (Call) Stack:Lefteous wrote:So just point me to the 'API call' of 'FileSystemControl' or 'Display(DirEntry1)'!
E.g.
Code: Select all
0 fltmgr.sys FltAcquirePushLockShared + 0x907 0xfffff88001202067 C:\Windows\system32\drivers\fltmgr.sys
1 fltmgr.sys FltIsCallbackDataDirty + 0xa39 0xfffff88001203329 C:\Windows\system32\drivers\fltmgr.sys
2 fltmgr.sys FltDeletePushLock + 0x4f2 0xfffff88001222942 C:\Windows\system32\drivers\fltmgr.sys
3 ntoskrnl.exe NtMapViewOfSection + 0x15a7 0xfffff80003defe67 C:\Windows\system32\ntoskrnl.exe
4 ntoskrnl.exe NtFsControlFile + 0x56 0xfffff80003dac892 C:\Windows\system32\ntoskrnl.exe
5 ntoskrnl.exe KeSynchronizeExecution + 0x3a23 0xfffff80003ad1e53 C:\Windows\system32\ntoskrnl.exe
6 wow64cpu.dll TurboDispatchJumpAddressEnd + 0x6c0 0x74dd2e09 C:\Windows\SYSTEM32\wow64cpu.dll
7 wow64cpu.dll TurboDispatchJumpAddressEnd + 0x1fb 0x74dd2944 C:\Windows\SYSTEM32\wow64cpu.dll
8 wow64.dll Wow64SystemServiceEx + 0x1ce 0x74e4d286 C:\Windows\SYSTEM32\wow64.dll
9 wow64.dll Wow64LdrpInitialize + 0x42a 0x74e4c69e C:\Windows\SYSTEM32\wow64.dll
10 ntdll.dll RtlIsDosDeviceName_U + 0x23a27 0x773ed447 C:\Windows\SYSTEM32\ntdll.dll
11 ntdll.dll LdrInitializeThunk + 0xe 0x7739c34e C:\Windows\SYSTEM32\ntdll.dll
12 ntdll.dll NtFsControlFile + 0x15 0x7756fe0d C:\Windows\SysWOW64\ntdll.dll
13 SHELL32.dll SHCLSIDFromString + 0x1210 0x75c7ce89 C:\Windows\syswow64\SHELL32.dll
14 SHELL32.dll SHCLSIDFromString + 0x1112 0x75c7cd8b C:\Windows\syswow64\SHELL32.dll
15 SHELL32.dll SHCreateShellItemArrayFromIDLists + 0x1392 0x75c55fa3 C:\Windows\syswow64\SHELL32.dll
16 SHELL32.dll SHCreateShellItemArrayFromIDLists + 0x114e 0x75c55d5f C:\Windows\syswow64\SHELL32.dll
17 SHELL32.dll SHCreateShellItemArrayFromIDLists + 0x12b2 0x75c55ec3 C:\Windows\syswow64\SHELL32.dll
18 SHELL32.dll SHCreateShellItemArrayFromIDLists + 0x11d3 0x75c55de4 C:\Windows\syswow64\SHELL32.dll
19 SHELL32.dll SHRestricted + 0xd52 0x75c6fd7d C:\Windows\syswow64\SHELL32.dll
20 TOTALCMD.EXE TOTALCMD.EXE + 0x2e0736 0x6e0736 E:\TotalCmd\TOTALCMD.EXE
21 TOTALCMD.EXE TOTALCMD.EXE + 0x18c9a 0x418c9a E:\TotalCmd\TOTALCMD.EXE
22 TOTALCMD.EXE TOTALCMD.EXE + 0x362e 0x40362e E:\TotalCmd\TOTALCMD.EXE
23 kernel32.dll BaseThreadInitThunk + 0x12 0x7686338a C:\Windows\syswow64\kernel32.dll
24 ntdll.dll RtlInitializeExceptionChain + 0x63 0x77589f72 C:\Windows\SysWOW64\ntdll.dll
25 ntdll.dll RtlInitializeExceptionChain + 0x36 0x77589f45 C:\Windows\SysWOW64\ntdll.dll
In that case it always points to :
Code: Select all
INVALID DEVICE REQUEST Control: FSCTL_LMR_QUERY_DEBUG_INFO
If you think so...Lefteous wrote:My experience with these monitors is that they display mostly low level garbage.
It helped me quite often to understand some program's behavior,
no need to start some debugger that might not work at all if you're out of luck.